AIOS-12-012200 - Apple iOS users must complete required training.

Information

The security posture on iOS devices requires the device user to configure several required policy rules on their device. User Based Enforcement (UBE) is required for these controls. In addition, if the AO has approved users' full access to the Apple App Store, than users must receive training on risks. If a user is not aware of their responsibilities and does not comply with UBE requirements, the security posture of the iOS mobile device may become compromised and DoD sensitive data may become compromised.

SFR ID: NA

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Have all iOS device users complete training on the following topics. Users should acknowledge they have received training via a signed User Agreement or similar written record.

Training Topics:

-Operational security concerns introduced by unmanaged applications including applications utilizing global positioning system (GPS) tracking

-Need to ensure no DoD data is saved in an unmanaged app or transmitted from a personal app (for example, from personal email)

-If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DoD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys, and to report any loss of control so that the credentials can be revoked. Upon device retirement, turn in, or reassignment, ensure a factory data reset is performed prior to device hand off. Follow Mobility service provider decommissioning procedures as applicable.

-How to configure the following User Based Enforcement (UBE) controls (users must configure the control) and other controls on the iOS device:
**Remove Family Sharing
**Disable Shared Location
**Disable Wi-Fi Assist
**Use AirPrint only with AO-approved printers and print servers (see the Multifunction Device STIG for requirements)
**Turn off 'Apps' under 'AUTOMATIC DOWNLOADS' in the 'iTunes & App Store' section of the Settings app on the Apple iOS device
**Secure use of Calendar Alarm
**Do not configure a DoD network (work) VPN profile on any third-party unmanaged VPN app
**iOS device radios should be disabled using controls under 'Settings' instead of 'Control Center'

-AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.)

-Operational security concerns introduced by unmanaged appl

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_iOS_12_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6(1), 800-53|CM-6b., 800-53|CM-7a., CAT|II, CCI|CCI-000366, CCI|CCI-000370, CCI|CCI-000381, Rule-ID|SV-237271r859302_rule, STIG-ID|AIOS-12-012200, STIG-Legacy|SV-96551, STIG-Legacy|V-81837, Vuln-ID|V-237271

Plugin: MDM

Control ID: 718098d079c1931777369f23a46dd3bd83d4bf09f0e8c965e1e743ca7747dc64