Check: AIOS-18-010200
Apple iOS/iPadOS 18 STIG:
AIOS-18-010200
(in version v1 r4)
Title
Apple iOS/iPadOS 18 must be configured to disable ad hoc wireless client-to-client connection capability. (Cat II impact)
Discussion
Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow the exposure of sensitive DOD data and increase the risk of downloading and installing malware on the DOD mobile device. SFRID: FMT_SMF_EXT.1.1/WLAN
Check Content
Review configuration settings to confirm AirDrop is disabled. This is a supervised-only control. If the iPhone or iPad being reviewed is not supervised by the MDM, this control is automatically a finding. If the iPhone or iPad being reviewed is supervised by the MDM, follow these procedures: This check procedure is performed on both the device management tool and the iPhone and iPad device. Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. In the iOS/iPadOS management tool, verify "Allow AirDrop" is unchecked. On the iPhone/iPad device: 1. Open the Settings app. 2. Tap "General". 3. Tap "VPN & Device Management". 4. Tap the Configuration Profile from the iOS management tool containing the restrictions policy. 5. Tap "Restrictions". 6. Verify "AirDrop not allowed" is listed. If "AirDrop not allowed" is not listed in the management tool and on the Apple device, this is a finding.
Fix Text
Install a configuration profile to disable the AllowAirDrop control in the management tool. This is a supervised-only control.
Additional Identifiers
Rule ID: SV-268022r1115587_rule
Vulnerability ID: V-268022
Group Title: PP-MDF-333330
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002536 |
Protect organization-defined external and internal wireless links from organization-defined types of signal parameter attacks or references to sources for such attacks. |
Controls
Number | Title |
---|---|
SC-40 |
Wireless Link Protection |