Check: AIOS-10-080102
Apple iOS 10 STIG:
AIOS-10-080102
(in versions v1 r3 through v1 r1)
Title
Apple iOS must implement the management setting: remove managed applications upon unenrollment from MDM. (Cat II impact)
Discussion
When a device is unenrolled from MDM, it is possible to relax the security policies that the MDM had implemented on the device. This may cause apps and data to be more vulnerable than they were prior to enrollment. Removing managed apps (and consequently the data they maintain) upon unenrollment mitigates this risk because on appropriately configured Apple iOS devices, DoD-sensitive information exists only within managed apps. SFR ID: FMT_SMF_EXT.1.1 #45
Check Content
Note: The procedure below is exactly the same for requirement AIOS-11-080202. This procedure needs to be performed only once. Note: Not all Apple iOS deployments involve MDM. If the site uses an authorized alternative to MDM for distribution of configuration profiles (Apple Configurator), this check procedure is not applicable. This check procedure is performed on the Apple iOS management tool. In the Apple iOS management tool, for each managed app, verify the app is configured to be removed when the MDM profile is removed. If one or more managed apps are not set to be removed upon device MDM unenrollment, this is a finding.
Fix Text
Install a configuration profile to delete all managed apps upon device unenrollment.
Additional Identifiers
Rule ID: SV-86501r1_rule
Vulnerability ID: V-71877
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |