Check: AIOS-11-012800
Apple iOS 11 STIG:
AIOS-11-012800
(in versions v1 r4 through v1 r1)
Title
If an unmanaged third-party VPN client is installed on the iOS device, it must not be configured with a DoD network (work) VPN profile. (Cat II impact)
Discussion
Access to the DoD network must be limited for unmanaged apps because they are considered untrusted. SFR ID: FMT_SMF_EXT.1.1 #3
Check Content
Review the list of unmanaged apps installed on the iOS device and determine if any third-party VPN clients are installed. If yes, verify the VPN app is not configured with a DoD network (work) VPN profile. This validation procedure is performed on the iOS device only. On the iOS device, do the following: 1. Under Settings, VPN look for to see if any "Personal VPN" exists. 2. If yes, open each VPN app in turn. Review the list of VPN profiles configured on the VPN client. 3. Verify there are no DoD network VPN profiles configured on the VPN client. If any third-party unmanaged VPN apps are installed (personal VPN) and has a DoD network VPN profile configured on the client, this is a finding. Note: This setting cannot be managed by the MDM administrator and is a User Based Enforcement (UBE) requirement.
Fix Text
If a third-party unmanaged VPN app is installed on the iOS 11 device, do not configure the VPN app with a DoD network VPN profile.
Additional Identifiers
Rule ID: SV-93145r1_rule
Vulnerability ID: V-78439
Group Title: PP-MDF-301060
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000068 |
The information system implements cryptographic mechanisms to protect the confidentiality of remote access sessions. |
Controls
Number | Title |
---|---|
AC-17 (2) |
Protection Of Confidentiality / Integrity Using Encryption |