DISA STIGS Viewer

Apple iOS/iPadOS 18 Security Technical Implementation Guide

Overview

Version Date Finding Count (92) Downloads
1 2025-06-30 CAT I (High): 4 CAT II (Medium): 62 CAT III (Low): 26 Excel JSON XML
Stig Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
Classified Public Sensitive  
I - Mission Critical Classified I - Mission Critical Public I - Mission Critical Sensitive II - Mission Critical Classified II - Mission Critical Public II - Mission Critical Sensitive III - Mission Critical Classified III - Mission Critical Public III - Mission Critical Sensitive

Findings - MAC I - Mission Critical Public

Finding ID Severity Title Description
V-272169 High Apple iOS/iPadOS 18 must disable the ability to hide apps. Hidden apps cannot be seen by enterprise management applications (e.g., MDM server), and therefore, unauthorized apps or apps with embedded malware could be installed and hidden from the MDM or mobile threat detection (MTD) apps. Hidden apps may lead to the compromise of sensitive DOD data or provide a vector...
V-268034 High iPhone and iPad must have the latest available iOS/iPadOS operating system installed. Required security features are not available in earlier OS versions. In addition, earlier versions may have known vulnerabilities. SFRID: FMT_SMF.1.1 #47
V-268024 High Apple iOS/iPadOS 18 must require a valid password be successfully entered before the mobile device data is unencrypted. Passwords provide a form of access control that prevents unauthorized individuals from accessing computing resources and sensitive data. Passwords may also be a source of entropy for generation of key encryption or data encryption keys. If a password is not required to access data, this data is accessible to any...
V-267992 High Apple iOS/iPadOS 18 must be configured to enforce a passcode reuse prohibition of at least two generations. iOS-iPadOS 17 and later versions include a feature that allows the previous passcode to be valid for 72 hours after a passcode change. If the previous passcode has been compromised and the attacker has access to it and the Apple device, enterprise data and the enterprise network can be compromised....
V-276224 Medium Apple iOS/iPadOS 18 must implement the management setting: disable Camera. Authorizing Official (AO) approval is required before the Apple device camera can be enabled for a specific user or group of users, based on a risk assessment of the operational environment. Camera use may lead to the exposure of sensitive DOD information in some operational environments. SFR ID: FMT_MOF_EXT.1.2 #47
V-276214 Medium DOD Apple iOS/iPadOS 18 devices must have a Mobile Threat Detection (MTD) app installed. DOD mobile devices are at constant risk of cyber threats. MTD apps mitigate these risks by providing real-time threat detection, malware prevention, and vulnerability analysis. SFR ID: FMT_MOF_EXT.1.2 #47
V-276204 Medium Apple iOS/iPadOS 18 must disable pairing with a host Mac or PC. The connection of a DOD iPhone to a Mac or PC could cause the exposure of sensitive DOD information. SFR ID: FMT_MOF_EXT.1.2 #47
V-276203 Medium Apple iOS/iPadOS 18 must disable automatic downloads of apps purchased on other Apple devices. The automatic download of apps to a DOD mobile device could cause the exposure of sensitive DOD information when an unauthorized app is installed. SFR ID: FMT_MOF_EXT.1.2 #47
V-276199 Medium Apple iOS/iPadOS 18 must disable the ability of the user to wipe the device. This feature must be disabled to comply with DOD electronic records retention requirements for mobile devices. Otherwise, mobile device users could wipe the device, which would violate DOD policy. SFR ID: FMT_MOF_EXT.1.2 #47
V-276198 Medium DOD Apple iOS/iPadOS 18 devices must disable screenshots and screen recordings. A screenshot or screen recording of sensitive DOD information could lead to the inadvertent exposure of that information.
V-276197 Medium DOD Apple iOS/iPadOS 18 devices must disable eSIM transfers. eSIM transfers could lead to the unauthorized use of DOD paid cellular service.
V-276196 Medium DOD Apple iOS/iPadOS 18 devices must disable FaceTime. FaceTime is considered a personal use feature.
V-272171 Medium Apple iOS/iPadOS 18 must disable iPhone Mirroring on Mac. iPhone Mirroring allows managed data on a DOD iPhone to be manipulated by an unmanaged Mac. In certain situations, this may lead to the exposure of sensitive DOD data like notifications, messages, photos, etc. SFRID: FMT_MOF_EXT.1.2 #47
V-272170 Medium Apple iOS/iPadOS 18 must disable recording cell phone calls on the iPhone. Cell phone recordings are saved as unmanaged recordings in the Notes app, which may be accessible to unmanaged apps. There is a risk that sensitive DOD information can be recorded from a cell phone call, saved in Notes, and be accessible to an unmanaged App, which may expose sensitive DOD...
V-269568 Medium Apple iOS/iPadOS 18 must disable the download of iOS/iPadOS beta updates. Beta operating system updates may contain features that could lead to the compromise of sensitive DOD information or provide a vector for the attack on the DOD network. The current STIG will not normally provide controls to disable these unsecure features.
V-268068 Medium Apple iOS/iPadOS 18 must disable ChatGPT and other external AI app connections in Apple Intelligence. The ChatGPT feature of Apple Intelligence allows DOD information to be downloaded from the DOD iPhone/iPad and processed by the ChatGPT application in the cloud. The ChatGPT feature of Apple Intelligence increases the risk of compromise of sensitive DOD information. SFRID: FMT_MOF_EXT.1.2 #47
V-268067 Medium Apple iOS/iPadOS 18 must delete eSIM content when the device is erased. An eSIM may contain sensitive DOD data and must be wiped of data when the mobile device is wiped to protect sensitive data from exposure. SFRID: FMT_MOF_EXT.1.2 #47
V-268066 Medium Apple iOS/iPadOS 18 must disable app installation from a website. Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DOD data accessible by these unauthorized/malicious applications. SFRID: FMT_MOF_EXT.1.2 #47
V-268065 Medium Apple iOS/iPadOS 18 must disable the installation of alternative marketplace apps. Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DOD data accessible by these unauthorized/malicious applications. SFRID: FMT_MOF_EXT.1.2 #47
V-268064 Medium Apple iOS/iPadOS 18 must be configured to disable "Auto Unlock" of the iPhone by an Apple Watch. Auto Unlock allows an Apple Watch to automatically unlock an iPhone or Mac when in close proximity (not available for iPad). This feature allows the iPhone/Mac to be unlocked without the user entering the device passcode, which may lead to unauthorized users access to the iPhone/Mac and sensitive DOD data....
V-268063 Medium Apple iOS/iPadOS 18 must have DOD root and intermediate PKI certificates installed. DOD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the user is allowed to remove root and intermediate certificates, the user could allow an adversary to falsely sign a certificate in such a way that it could not...
V-268062 Medium Apple iOS/iPadOS 18 must disable copy/paste of data from managed to unmanaged applications. If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFRID: FMT_SMF.1.1 #47
V-268061 Medium Apple iOS/iPadOS 18 must disable connections to Siri servers for the purpose of translation. If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. Translation information could contain sensitive DOD...
V-268060 Medium Apple iOS/iPadOS 18 must disable connections to Siri servers for the purpose of dictation. If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. Dictation information could contain sensitive DOD...
V-268059 Medium Apple iOS/iPadOS 18 must disable "Allow network drive access in Files access". Allowing network drive access by the Files app could lead to the introduction of malware or unauthorized software into the DOD IT infrastructure and compromise of sensitive DOD information and systems. SFRID: FMT_SMF.1.1 #47
V-268058 Medium Apple iOS must implement the management setting: not allow a user to remove Apple iOS configuration profiles that enforce DOD security requirements. Configuration profiles define security policies on Apple iOS devices. If a user is able to remove a configuration profile, the user can then change the configuration that had been enforced by that policy. Relaxing security policies may introduce vulnerabilities the profiles had mitigated. Configuring a profile to never be removed...
V-268056 Medium Apple iOS/iPadOS 18 must disable "Allow USB drive access in Files app" if the authorizing official (AO) has not approved the use of DOD-approved USB storage drives with iOS/iPadOS devices. Unauthorized use of USB storage drives could lead to the introduction of malware or unauthorized software into the DOD IT infrastructure and compromise of sensitive DOD information and systems. SFRID: FMT_SMF.1.1 #47
V-268055 Medium The Apple iOS/iPadOS 18 must be supervised by the MDM. When an iOS/iPadOS is not supervised, the DOD mobile service provider cannot control when new iOS/iPadOS updates are installed on site-managed devices. Most updates should be installed immediately to mitigate new security vulnerabilities, while some sites need to test each update prior to installation to ensure critical missions are not...
V-268053 Medium Apple iOS/iPadOS 18 must disable password sharing. This control allows sharing passwords between Apple devices using AirDrop. This could lead to a compromise of the device password with an unauthorized person or device. DOD Apple device passwords must not be shared. SFRID: FMT_SMF.1.1 #47
V-268052 Medium Apple iOS/iPadOS 18 must disable password proximity requests. This control allows one Apple device to be notified to share its password with a nearby device. This could lead to a compromise of the device password with an unauthorized person or device. DOD Apple device passwords must not be shared. SFRID: FMT_SMF.1.1 #47
V-268051 Medium Apple iOS/iPadOS 18 must disable "Allow setting up new nearby devices". This control allows Apple device users to request passwords from nearby devices. This could lead to a compromise of the device password with an unauthorized person or device. DOD Apple device passwords must not be shared. SFRID: FMT_SMF.1.1 #47
V-268050 Medium Apple iOS/iPadOS 18 must disable "Password AutoFill" in browsers and applications. The AutoFill functionality in browsers and applications allows the user to complete a form that contains sensitive information, such as PII, without previous knowledge of the information. By allowing the use of the AutoFill functionality, an adversary who learns a user's iPhone and iPad passcode, or who otherwise is able...
V-268049 Medium Apple iOS/iPadOS 18 must implement the management setting: approved Apple Watches must be managed by an MDM. Authorizing official (AO) approval is required before an Apple Watch (DOD-owned or personally owned) can be paired with a DOD-owned iPhone to ensure the AO has evaluated the risk in having sensitive DOD data transferred to and stored on an Apple Watch in their operational environment. SFRID: FMT_SMF.1.1 #47
V-268048 Medium Apple iOS/iPadOS 18 must implement the management setting: disable paired Apple Watch. Sensitive DOD information could be exposed if an unauthorized Apple Watch is paired to a DOD iPhone. SFRID: FMT_SMF.1.1 #47
V-268047 Medium Apple iOS/iPadOS 18 must implement the management setting: disable AirDrop. AirDrop is a way to send contact information or photos to other users with this same feature enabled. This feature enables a possible attack vector for adversaries to exploit. Once the attacker has gained access to the information broadcast by this feature, the attacker may distribute this sensitive information very...
V-268044 Medium Apple iOS/iPadOS 18 must implement the management setting: enable USB Restricted Mode. The USB port on an iOS device can be used to access data on the device. The required settings ensure the Apple device password is entered before a previously trusted USB accessory can connect to the device. SFRID: FMT_SMF.1.1 #47
V-268042 Medium A managed photo app must be used to take and store work-related photos. The iOS Photos app is unmanaged and may sync photos with a device or user's personal iCloud account. Therefore, work-related photos must not be taken via the iOS camera app or stored in the Photos app. A managed photo app must be used to take and manage work-related photos. SFRID:...
V-268041 Medium Apple iOS/iPadOS 18 users must complete required training. The security posture on iOS devices requires the device user to configure several required policy rules on their device. User-Based Enforcement (UBE) is required for these controls. In addition, if the authorizing official (AO) has approved users' full access to the Apple App Store, users must receive training on risks....
V-268039 Medium Apple iOS/iPadOS 18 must implement the management setting: not share location data through iCloud. Sharing of location data is an operational security (OPSEC) risk because it potentially allows an adversary to determine a DOD user's location, movements, and patterns in those movements over time. An adversary could use this information to target the user or gather intelligence on the user's likely activities. Using commercial...
V-268037 Medium Apple iOS/iPadOS 18 must implement the management setting: treat AirDrop as an unmanaged destination. AirDrop is a way to send contact information or photos to other users with AirDrop enabled. This feature enables a possible attack vector for adversaries to exploit. Once the attacker has gained access to the information broadcast by this feature, the attacker may distribute this sensitive information very quickly and...
V-268036 Medium Apple iOS/iPadOS 18 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 18 Mail app. The Apple iOS/iPadOS Mail app can be configured to support multiple email accounts concurrently. These email accounts are likely to involve content of varying degrees of sensitivity (e.g., both personal and enterprise messages). To prevent the unauthorized and undetected forwarding or moving of messages from one account to another, Mail...
V-268035 Medium Apple iOS/iPadOS 18 must implement the management setting: use SSL for Exchange ActiveSync. Exchange email messages are a form of data in transit and thus are vulnerable to eavesdropping and man-in-the-middle attacks. Secure Sockets Layer (SSL), also referred to as Transport Layer Security (TLS), provides encryption and authentication services that mitigate the risk of breach. SFRID: FMT_SMF.1.1 #47
V-268033 Medium Apple iOS/iPadOS 18 must implement the management setting: disable Allow MailDrop. MailDrop allows users to send large attachments (up to 5 GB) via iCloud. Storing data with a non-DOD cloud provider may leave the data vulnerable to breach. Disabling non-DOD cloud services mitigates this risk. SFRID: FMT_SMF.1.1 #47
V-268028 Medium Apple iOS/iPadOS 18 must implement the management setting: encrypt backups/Encrypt local backup. If iCloud backups are not encrypted, this could lead to the unauthorized disclosure of DOD sensitive information if non-DOD personnel are able to access that machine. Forcing the backup to be encrypted greatly mitigates the risk of compromising sensitive data. Work data iCloud backup and USB connections to computers are...
V-268022 Medium Apple iOS/iPadOS 18 must be configured to disable ad hoc wireless client-to-client connection capability. Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow the exposure of sensitive DOD data and increase the risk of downloading and installing malware on the DOD mobile device. SFRID: FMT_SMF_EXT.1.1/WLAN
V-268020 Medium Apple iOS/iPadOS 18 must be configured to [selection: remove Enterprise applications, remove all noncore applications (any nonfactory-installed application)] upon unenrollment from MDM. When a mobile device is no longer going to be managed by MDM technologies, its protected/sensitive data must be sanitized because it will no longer be protected by the MDM software, putting it at much greater risk of unauthorized access and disclosure. At least one of the two options must...
V-268019 Medium Apple iOS/iPadOS 18 must be configured to [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM. When a mobile device is no longer going to be managed by MDM technologies, its protected/sensitive data must be sanitized because it will no longer be protected by the MDM software, putting it at much greater risk of unauthorized access and disclosure. At least one of the two options must...
V-268018 Medium Apple iPadOS 18 must be configured to disable multiuser modes. Multiuser mode allows multiple users to share a mobile device by providing a degree of separation between user data. To date, no mobile device with multiuser mode features meets DOD requirements for access control, data separation, and nonrepudiation for user accounts. In addition, the MDFPP does not include design requirements...
V-268017 Medium Apple iOS/iPadOS 18 must not allow non-DOD applications to access DOD data. App data sharing gives apps the ability to access the data of other apps for enhanced user functionality. However, sharing also poses a significant risk that unauthorized users or apps will obtain access to sensitive DOD information. To mitigate this risk, there are data sharing restrictions. If a user is...
V-268013 Medium Apple iOS/iPadOS 18 must be configured to not allow backup of [all applications, configuration data] to locally connected systems. Data on mobile devices is protected by numerous mechanisms, including user authentication, access control, and cryptography. When the data is backed up to an external system (either locally connected or cloud based), many if not all of these mechanisms are no longer present. This leaves the backed-up data vulnerable to...
V-267999 Medium Apple iOS/iPadOS 18 must not display notifications (calendar information) when the device is locked. Many mobile devices display notifications on the lock screen so users can obtain relevant information in a timely manner without having to frequently unlock the phone to determine if there are new notifications. However, in many cases, these notifications can contain sensitive information. When they are available on the lock...
V-267998 Medium Apple iOS/iPadOS 18 must be configured to not display notifications when the device is locked. Many mobile devices display notifications on the lock screen so users can obtain relevant information in a timely manner without having to frequently unlock the phone to determine if there are new notifications. However, in many cases, these notifications can contain sensitive information. When they are available on the lock...
V-267997 Medium The Apple iOS/iPadOS 18 allow list must be configured to not include applications with the following characteristics: - Backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services); - Transmits MD diagnostic data to non-DOD servers; - Allows synchronization of data or applications between devices associated with user; - Allows unencrypted (or encrypted but not FIPS 140-3 validated) data sharing with other MDs or printers; - Backs up its own data to a remote system; and - Uses artificial intelligence (AI), which processes data in the cloud (off device). Exception: Apple Intelligence Private Cloud Compute (PCC). Requiring all authorized applications to be in an application allow list prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the allow list. Failure to configure an application allow list properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the...
V-267995 Medium Apple iOS/iPadOS 18 must not include applications with the following characteristics: access to Siri when the device is locked. Requiring all authorized applications to be in an application allow list prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the allow list. Failure to configure an application allow list properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the...
V-267993 Medium Apple iOS/iPadOS 18 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store]. Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DOD data accessible by these unauthorized/malicious applications. SFRID: FMT_SMF.1.1 #8
V-267991 Medium Apple iOS/iPadOS 18 must be configured to not allow more than 10 consecutive failed authentication attempts. The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of attempts mitigates this risk. Setting the limit at 10 or less gives authorized users the...
V-267990 Medium Apple iOS/iPadOS 18 must be configured to lock the display after 15 minutes (or less) of inactivity. The screen lock timeout must be set to a value that helps protect the device from unauthorized access. Having a too-long timeout would increase the window of opportunity for adversaries who gain physical access to the mobile device through loss, theft, etc. Such devices are much more likely to be...
V-267988 Medium Apple iOS/iPadOS 18 must be configured to not allow passwords that include more than four repeating or sequential characters. Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. Passwords that contain repeating or sequential characters are significantly easier to guess than those that do not contain repeating or sequential characters. Therefore, disallowing repeating or sequential characters increases password strength and...
V-267987 Medium Apple iOS/iPadOS 18 must be configured to enforce a minimum password length of six characters. Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a function of how many attempts an adversary is permitted, how quickly an adversary can do each attempt, and the size of the password space....
V-267964 Medium Apple iOS/iPadOS 18 must not allow backup to remote systems (enterprise books). If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFRID: FMT_MOF_EXT.1.2 #40
V-267963 Medium Apple iOS/iPadOS 18 must not allow backup to remote systems (managed applications data stored in iCloud). If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFRID: FMT_MOF_EXT.1.2 #40
V-267962 Medium Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Stream or Shared Photo Stream). If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFRID: FMT_MOF_EXT.1.2 #40
V-267961 Medium Apple iOS/iPadOS 18 must not allow backup to remote systems (Cloud Photo Library). If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFRID: FMT_MOF_EXT.1.2 #40
V-267960 Medium Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud Keychain). If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFRID: FMT_MOF_EXT.1.2 #40
V-267959 Medium Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud document and data synchronization). If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFRID: FMT_MOF_EXT.1.2 #40
V-267958 Medium Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud). If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFRID: FMT_MOF_EXT.1.2 #40
V-276213 Low Apple iOS/iPadOS 18 must disable the Apple Intelligence feature: generate new Genmoji. The security of the Apple Intelligence system has not been vetted by the DOD, and the risk to DOD sensitive information is not known at this time. Therefore, Apple intelligence features must be disabled until more information is available. SFR ID: FMT_MOF_EXT.1.2 #47
V-276212 Low Apple iOS/iPadOS 18 must disable the Apple Intelligence feature: Image Generation. The security of the Apple Intelligence system has not been vetted by the DOD, and the risk to DOD sensitive information is not known at this time. Therefore, Apple intelligence features must be disabled until more information is available. SFR ID: FMT_MOF_EXT.1.2 #47
V-276211 Low Apple iOS/iPadOS 18 must disable the Apple Intelligence feature: Image Wand. The security of the Apple Intelligence system has not been vetted by the DOD, and the risk to DOD sensitive information is not known at this time. Therefore, Apple intelligence features must be disabled until more information is available. SFR ID: FMT_MOF_EXT.1.2 #47
V-276210 Low Apple iOS/iPadOS 18 must disable Allowed Content Ratings (TV Shows). There is no known mission need for this personal use feature. SFR ID: FMT_MOF_EXT.1.2 #47
V-276209 Low Apple iOS/iPadOS 18 must disable Allowed Content Ratings (Movies). There is no known mission need for this personal use feature. SFR ID: FMT_MOF_EXT.1.2 #47
V-276208 Low Apple iOS/iPadOS 18 must enable AirPrint feature: Disallow AirPrint to destinations with untrusted certificates. AirPrint allows the printing of sensitive DOD documents to non-DOD controlled printers, which may lead to the exposure of sensitive DOD information. SFR ID: FMT_MOF_EXT.1.2 #47
V-276207 Low Apple iOS/iPadOS 18 must disable AirPrint: Allow storage of AirPrint credentials in Keychain. AirPrint allows the printing of sensitive DOD documents to non-DOD controlled printers, which may lead to the exposure of sensitive DOD information. SFR ID: FMT_MOF_EXT.1.2 #47
V-276206 Low Apple iOS/iPadOS 18 must disable AirPrint: Allow discovery of AirPrint printers using iBeacons. AirPrint allows the printing of sensitive DOD documents to non-DOD controlled printers, which may lead to the exposure of sensitive DOD information. SFR ID: FMT_MOF_EXT.1.2 #47
V-276205 Low Apple iOS/iPadOS 18 must disable AirPrint. AirPrint allows the printing of sensitive DOD documents to non-DOD controlled printers, which may lead to the exposure of sensitive DOD information. SFR ID: FMT_MOF_EXT.1.2 #47
V-276202 Low Apple iOS/iPadOS 18 must disable the use of voice assistant (Siri suggestions) unless required to meet Section 508 compliance requirements. The use of voice assistants could expose sensitive DOD data to cloud-based servers during the processing of assistant requests. SFR ID: FMT_MOF_EXT.1.2 #47
V-276201 Low Apple iOS/iPadOS 18 must disable the use of voice assistant (Show user-generated content in Siri) unless required to meet Section 508 compliance requirements. The use of voice assistants could expose sensitive DOD data to cloud-based servers during the processing of assistant requests. SFR ID: FMT_MOF_EXT.1.2 #47
V-276200 Low Apple iOS/iPadOS 18 must disable the use of voice assistant (Siri) unless required to meet Section 508 compliance requirements. The use of voice assistants could expose sensitive DOD data to cloud-based servers during the processing of assistant requests. SFR ID: FMT_MOF_EXT.1.2 #47
V-268057 Low The Apple iOS must be configured to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled. Many software systems automatically send diagnostic data to the manufacturer or a third-party. This data enables the developers to understand real-world field behavior and improve the product based on that information. Unfortunately, it can also reveal information about what DOD users are doing with the systems and what causes them...
V-268054 Low Apple iOS/iPadOS 18 must disable "Find My Friends" in the "Find My" app. This control does not share a DOD user's location but encourages location sharing between DOD mobile device users, which can lead to operational security (OPSEC) risks. Sharing the location of a DOD mobile device is a violation of AIOS-17-011700. SFRID: FMT_SMF.1.1 #47
V-268046 Low Apple iOS/iPadOS 18 must not allow unmanaged apps to read contacts from managed contacts accounts. Managed apps have been approved for the handling of DOD sensitive information. Unmanaged apps are provided for productivity and morale purposes but are not approved to handle DOD sensitive information. Examples of unmanaged apps include those for news services, travel guides, maps, and social networking. If a document were to...
V-268045 Low Apple iOS/iPadOS 18 must not allow managed apps to write contacts to unmanaged contacts accounts. Managed apps have been approved for the handling of DOD sensitive information. Unmanaged apps are provided for productivity and morale purposes but are not approved to handle DOD sensitive information. Examples of unmanaged apps include those for news services, travel guides, maps, and social networking. If a document were to...
V-268040 Low Apple iOS/iPadOS 18 must implement the management setting: force Apple Watch wrist detection. Because Apple Watch is a personal device, it is key that any sensitive DOD data displayed on the Apple Watch cannot be viewed when the watch is not in the immediate possession of the user. This control ensures the Apple Watch screen locks when the user takes the watch off,...
V-268038 Low Apple iOS/iPadOS 18 must implement the management setting: not have any Family Members in Family Sharing. Apple's Family Sharing service allows Apple iOS/iPadOS users to create a Family Group whose members have several shared capabilities, including the ability to lock, wipe, play a sound on, or locate the iPhone and iPads of other members. Each member of the group must be invited to the group and...
V-268032 Low Apple iOS/iPadOS 18 must implement the management setting: require passcode for incoming Airplay connection requests. When an incoming AirPlay request is allowed without a password, it may mistakenly associate the iPhone and iPad with an AirPlay-enabled device other than the one intended (i.e., by choosing the wrong one from the AirPlay list displayed). This creates the potential for someone in control of a mistakenly associated...
V-268031 Low Apple iOS/iPadOS 18 must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device. When a user is allowed to use AirPlay without a password, it may mistakenly associate the iPhone and iPad with an AirPlay-enabled device other than the one intended (i.e., by choosing the wrong one from the AirPlay list displayed). This creates the potential for someone in control of a mistakenly...
V-268030 Low Apple iOS/iPadOS 18 must implement the management setting: not allow use of iPhone widgets on Mac. iPhone widgets on Mac use Handoff. Handoff permits a user of an iPhone and iPad to transition user activities from one device to another. Handoff passes sufficient information between the devices to describe the activity, but app data synchronization associated with the activity is handled though iCloud, which should be...
V-268029 Low Apple iOS/iPadOS 18 must implement the management setting: not allow use of Handoff. Handoff permits a user of an iPhone and iPad to transition user activities from one device to another. Handoff passes sufficient information between the devices to describe the activity, but app data synchronization associated with the activity is handled though iCloud, which should be disabled on a compliant iPhone and...
V-268027 Low Apple iOS/iPadOS 18 must implement the management setting: not allow automatic completion of Safari browser passcodes. The AutoFill functionality in the Safari web browser allows the user to complete a form that contains sensitive information, such as PII, without previous knowledge of the information. By allowing the use of the AutoFill functionality, an adversary who learns a user's iPhone or iPad passcode, or who otherwise is...
V-268026 Low Apple iOS/iPadOS 18 must implement the management setting: limit Ad Tracking. Ad Tracking refers to the advertisers' ability to categorize the device and spam the user with ads that are most relevant to the user's preferences. By not "Force limiting ad tracking", advertising companies are able to gather information about the user and device's browsing habits. If "Limit Ad Tracking" is...
V-268007 Low Apple iOS/iPadOS 18 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.
V-267937 Low Apple iOS/iPadOS 18 must allow the administrator (MDM) to perform the following management function: enable/disable VPN protection across the device and [selection: on a per-app basis, on a per-group of applications processes basis]. The system administrator must have the capability to configure VPN access to meet organization-specific policies based on mission needs. Otherwise, a user could inadvertently or maliciously set up a VPN and connect to a network that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by...