Check: AIOS-26-012600
Apple iOS/iPadOS 26 STIG:
AIOS-26-012600
(in version v1 r2)
Title
Apple iOS/iPadOS 26 must implement the management setting: disable paired Apple Watch. (Cat II impact)
Discussion
Sensitive DOD could be exposed if an unauthorized Apple Watch is paired to a DOD iPhone. SFR ID: FMT_SMF.1.1 #47
Check Content
Review configuration settings to confirm "Allow Paired Watch" is disabled. This is a supervised-only control. If the iPhone or iPad being reviewed is not supervised by the MDM, this control is automatically a finding. If the iPhone or iPad being reviewed is supervised by the MDM, follow these procedures: This check procedure is performed on both the device management tool and the iPhone. Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. In the iOS management tool, verify "Allow Paired Watch" is unchecked. On the iPhone: 1. Open the Settings app. 2. Tap "General". 3. Tap "VPN & Device Management". 4. Tap the Configuration Profile from the iOS management tool containing the restrictions policy. 5. Tap "Restrictions". 6. Verify "Paired Apple Watch not allowed" is listed. If "Paired Apple Watch not allowed" is not listed both in the management tool and on the Apple device, this is a finding.
Fix Text
Install a configuration profile to disable the Apple Watch control in the management tool. This is a supervised-only control. Configuration Profile Key: allowPairedWatch
Additional Identifiers
Rule ID: SV-278807r1151172_rule
Vulnerability ID: V-278807
Group Title: PP-MDF-993300
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-000366 |
Implement the security configuration settings. |
Controls
| Number | Title |
|---|---|
| CM-6 |
Configuration Settings |