AIOS-13-001300 - Apple iOS/iPadOS must not include applications with the following: access to Siri when the device is locked.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

On iPhone and iPads, users can access the device's contact database or calendar to obtain phone numbers and other information using a human voice even when the mobile device is locked. Often this information is Personally Identifiable Information (PII), which is considered sensitive. It could also be used by an adversary to profile the user or engage in social engineering to obtain further information from other unsuspecting users. Disabling access to the contact database and calendar in these situations mitigates the risk of this attack. The AO may waive this requirement with written notice if the operational environment requires this capability.

SFR ID: FMT_SMF_EXT.1.1 #8b

Solution

Install a configuration profile to disable Siri while the device is locked.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_iOS_iPadOS_13_V1R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-19, 800-53|CM-7, CAT|II, CCI|CCI-000068, CSCv6|9.1, Rule-ID|SV-106535r1_rule, STIG-ID|AIOS-13-001300, Vuln-ID|V-97431

Plugin: MDM

Control ID: a39382b8ea3f7c6b7c44cb70236e29113a11b0c4fe6db1933d795f92422ba841