2.6.1 Ensure 'VPN' is 'Configured'

Information

This recommendation pertains to establishing a virtual private network (VPN) connection when appropriate.

Rationale:

The network to which a device connects provides important services that may be exploited by a malicious actor. Establishing a VPN mitigates the associated risks by encrypting data in transit and using known good network services, such as DNS.

Solution

This remediation procedure cannot be accomplished with a checkbox. As mentioned below, a per-application VPN configuration is the preferred option, but a system-wide VPN is also acceptable. An appropriate solution will need to be determined and implemented.
From the Configuration Profile:

Open Apple Configurator.

Open the Configuration Profile.

In the left window pane, click on the VPN tab.

In the right window pane, enter an appropriate VPN configuration.

Deploy the Configuration Profile.

From the device:

Tap Settings.

Tap General.

Tap VPN.

Enter an appropriate VPN configuration.

See Also

https://workbench.cisecurity.org/benchmarks/6168

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SC-8, 800-53|SC-8(1), CSCv7|14.4

Plugin: MDM

Control ID: ad9c12ccad35ba9632b2f2c1a9705229eab2357d8e1f3ce057b2fb4734fe7001