4.2 Ensure device is not obviously jailbroken or compromised

Information

This recommendation pertains to inspecting a device for the presence of the most common jailbreak indicator.

Rationale:

Apple imposes certain restrictions on which apps can be installed on a device. Further, no app can gain access to information and data on the device or another app without being given authorization. This restricts the potential risk of unauthorized access by an app due to the limited administrative rights allowed by Apple. A compromised iOS device, both unintentionally in the event of a malicious actor and willingly as for jailbroken devices, may circumvent the above restrictions and in doing so may execute arbitrary code, compromise configuration profile requirements, or open the device to exploits that are otherwise not possible.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Restore the iOS to a known good state from a trusted computer:

Open iTunes.

Connect the iOS device to the computer with a USB cable.

Select your iOS device within iTunes.

Select Restore iPhone/iPad.

After restoration, set up as a new device or restore from a known good backup.

See Also

https://workbench.cisecurity.org/benchmarks/15548

Item Details

Category: SYSTEM AND SERVICES ACQUISITION

References: 800-53|SA-22, CSCv7|2.2

Plugin: MDM

Control ID: 5e4b2d97ac0200b9566fcc21537ec36715b0ddca1bc6ae6ab5783275fc32576d