Check: AIOS-10-080103
Apple iOS 8 ISCG:
AIOS-10-080103
(in version v1 r1)
Title
Apple iOS must not allow a user to remove iOS configuration profiles that enforce DoD security requirements. (Cat II impact)
Discussion
Configuration profiles define security policies on iOS devices. If a user is able to remove a configuration profile, the user can then change the configuration that had been enforced by that policy. Relaxing security policies may introduce vulnerabilities that the profiles had mitigated. Configuring a profile to never be removed mitigates this risk. SFR ID: FMT_SMF.1.1 #42
Check Content
Review configuration settings to confirm Configuration Profiles are not removable. Note: This requirement is only applicable to sites that use an authorized alternative to MDM for distribution of Configuration Profiles. It is not applicable for devices enrolled in MDM. This check procedure is performed on both the iOS management tool and the iOS device. Note: If an organization has multiple configuration profiles, then the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. In the iOS management tool, verify "Security" is set to "Never". Alternatively, verify the text "<key>PayloadRemovalDisallowed</key><true/>" appears in the configuration profile (.mobileconfig file). On the iOS device: 1. Open the Settings app. 2. Tap "General". 3. Tap "Profiles" or "Profiles & Device Management" or "Device Management". 4. Tap each Configuration Profile from the iOS management tool. 5. Verify the "Delete Profile" button is not present. If the "Delete Profile" button is available on any Configuration Profile, this is a finding.
Fix Text
Configure the iOS configuration profile such that it can never be removed.
Additional Identifiers
Rule ID:
Vulnerability ID: V-54307
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |