AIOS-17-012500 - Apple iOS/iPadOS 17 must implement the management setting: disable AirDrop.

Information

AirDrop is a way to send contact information or photos to other users with this same feature enabled. This feature enables a possible attack vector for adversaries to exploit. Once the attacker has gained access to the information broadcast by this feature, the attacker may distribute this sensitive information very quickly and without DOD's control or awareness. By disabling this feature, the risk of mass data exfiltration will be mitigated.

Note: If the site uses Apple's optional Automatic Device Enrollment, this control is available as a supervised MDM control.

SFR ID: FMT_SMF_EXT.1.1 #47

Solution

If the AO has not approved the use of AirDrop for unmanaged data transfer, install a configuration profile to disable the 'Allow AirDrop' control in the management tool. This a supervised-only control.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_iOS-iPadOS_17_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-20(2), 800-53|CM-6b., CAT|III, CCI|CCI-000097, CCI|CCI-000366, Rule-ID|SV-258359r959010_rule, STIG-ID|AIOS-17-012500, Vuln-ID|V-258359

Plugin: MDM

Control ID: c68540beb7d70a5d006da4aff356f4babc91963e035acd7782c6282c39e2b521