Item Search

NameAudit NamePluginCategory
AIOS-01-100100 - Apple iOS must be configured to wipe all sensitive DoD data and PII data during a remote wipe command from the MDM server.MobileIron - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-10-080103 - Apple iOS must implement the management setting: not allow user to remove profiles that enforce DoD security requirements.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-14-000400 - The mobile operating system must be configured to not allow more than ten consecutive failed authentication attempts.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

ACCESS CONTROL

AIOS-14-009500 - Apple iOS/iPadOS must implement the management setting: Disable Allow Shared Albums.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-14-010100 - Apple iOS/iPadOS must implement the management setting: not share location data through iCloud.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

ACCESS CONTROL

AIOS-15-003500 - Apple iOS/iPadOS 15 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Photo Streams).MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-15-007400 - Apple iOS/iPadOS 15 allowlist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);- transmit MD diagnostic data to non-DoD servers; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011400 - Apple iOS/iPadOS 15 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 15 Mail app.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011500 - Apple iOS/iPadOS 15 must implement the management setting: Treat AirDrop as an unmanaged destination.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011500 - Apple iOS/iPadOS 15 must implement the management setting: Treat AirDrop as an unmanaged destination.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011700 - Apple iOS/iPadOS 15 must implement the management setting: not share location data through iCloud.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011900 - Apple iOS/iPadOS 15 users must complete required training.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-012200 - Apple iOS/iPadOS 15 must implement the management setting: enable USB Restricted Mode.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-012800 - Apple iOS/iPadOS 15 must disable allow setting up new nearby devices.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-014300 - Apple iOS/iPadOS 15 must disable 'Allow network drive access in Files access' - Allow network drive access in Files access.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-014400 - Apple iOS/iPadOS 15 must disable connections to Siri servers for the purpose of dictation.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-014500 - Apple iOS/iPadOS 15 must disable connections to Siri servers for the purpose of translation.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-014600 - Apple iOS/iPadOS 15 must disable copy/paste of data from managed to unmanaged applications.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-16-003000 - Apple iOS/iPadOS 16 must not allow backup to remote systems (iCloud) - iCloud.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-16-007300 - Apple iOS/iPadOS 16 allow list must be configured to not include applications with the following characteristics: allow voice dialing when MD is locked.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-007400 - Apple iOS/iPadOS 16 allowlist must be configured to not include applications with the following characteristics: - Backs up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - Transmits MD diagnostic data to non-DoD servers; - Allows synchronization of data or applications between devices associated with user; and - Allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-007400 - Apple iOS/iPadOS 16 allowlist must be configured to not include applications with the following characteristics: - Backs up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - Transmits MD diagnostic data to non-DoD servers; - Allows synchronization of data or applications between devices associated with user; and - Allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-011100 - Apple iOS/iPadOS 16 must implement the management setting: Disable Allow Shared Albums.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-011300 - Apple iOS/iPadOS 16 must implement the management setting: use SSL for Exchange ActiveSync.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-16-013500 - Apple iOS must implement the management setting: Not allow a user to remove Apple iOS configuration profiles that enforce DoD security requirements.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-706600 - Apple iOS/iPadOS 16 must be configured to not allow passwords that include more than four repeating or sequential characters.MobileIron - DISA Apple iOS/iPadOS BYOAD 16 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-706800 - Apple iOS/iPadOS 16 must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.MobileIron - DISA Apple iOS/iPadOS BYOAD 16 v1r1MDM

ACCESS CONTROL

AIOS-16-709200 - Apple iOS/iPadOS 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.MobileIron - DISA Apple iOS/iPadOS BYOAD 16 v1r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-003000 - Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud) - iCloud.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-003000 - Apple iOS/iPadOS 17 must not allow backup to remote systems (iCloud) - iCloud.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-006900 - Apple iOS/iPadOS 17 must be configured to not allow more than 10 consecutive failed authentication attempts.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL

AIOS-17-010200 - Apple iOS/iPadOS 17 must be configured to disable ad hoc wireless client-to-client connection capability.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-706900 - Apple iOS/iPadOS 17 must be configured to not allow more than 10 consecutive failed authentication attempts.MobileIron - DISA Apple iOS/iPadOS BYOAD 17 v1r1MDM

ACCESS CONTROL

APPL-11-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL

APPL-11-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures.DISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL

APPL-11-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked - minutesUntilFailedLoginResetDISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL

APPL-11-000023 - The macOS system must display the Standard Mandatory DoD Notice and Consent Banner before granting remote access to the operating system.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL

APPL-11-000031 - The macOS system must be configured so that log folders must not contain access control lists (ACLs).DISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY

APPL-11-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.DISA STIG Apple macOS 11 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple macOS 11 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-001012 - The macOS system must be configured with audit log files owned by root.DISA STIG Apple macOS 11 v1r5Unix

AUDIT AND ACCOUNTABILITY

APPL-11-001013 - The macOS system must be configured with audit log folders owned by root.DISA STIG Apple macOS 11 v1r5Unix

AUDIT AND ACCOUNTABILITY

APPL-11-002001 - The macOS system must be configured to disable SMB File Sharing unless it is required.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002004 - The macOS system must be configured to disable Location Services.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002007 - The macOS system must be configured to disable Internet Sharing.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - Access Control ListDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User directory groupsDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User directory home permissionsDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-003051 - The macOS system must be configured so that the su command requires smart card authentication.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-004002 - The macOS system must be configured with system log files set to mode 640 or less permissive - aslDISA STIG Apple macOS 11 v1r5Unix

SYSTEM AND INFORMATION INTEGRITY