I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
PP-MDF-333250
Group -
Apple iOS/iPadOS 17 must not allow backup to remote systems (managed applications data stored in iCloud).
If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploi...Rule Medium Severity -
PP-MDF-333250
Group -
Apple iOS/iPadOS 17 must not allow backup to remote systems (enterprise books).
If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploi...Rule Medium Severity -
PP-MDF-333024
Group -
Apple iOS/iPadOS 17 must be configured to enforce a minimum password length of six characters.
Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a function of how many attempts an adversary is p...Rule Medium Severity -
PP-MDF-333025
Group -
Apple iOS/iPadOS 17 must be configured to not allow passwords that include more than four repeating or sequential characters.
Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. Passwords that contain repeating or sequential characters are significantly easier t...Rule Medium Severity -
PP-MDF-333026
Group -
Apple iOS/iPadOS 17 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
The screen-lock timeout helps protect the device from unauthorized access. Devices without a screen-lock timeout provide an opportunity for adversaries who gain physical access to the mobile device...Rule Medium Severity -
PP-MDF-333030
Group -
Apple iOS/iPadOS 17 must be configured to lock the display after 15 minutes (or less) of inactivity.
The screen lock timeout must be set to a value that helps protect the device from unauthorized access. Having a too-long timeout would increase the window of opportunity for adversaries who gain ph...Rule Medium Severity -
PP-MDF-333040
Group -
Apple iOS/iPadOS 17 must be configured to not allow more than 10 consecutive failed authentication attempts.
The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of at...Rule Medium Severity -
PP-MDF-993300
Group -
Apple iOS/iPadOS 17 must be configured to enforce a passcode reuse prohibition of at least two generations.
iOS/iPadOS 17 includes a new feature that allows the previous passcode to be valid for 72 hours after a passcode change. If the previous passcode has been compromised and the attacker has access to...Rule High Severity -
PP-MDF-333050
Group -
Apple iOS/iPadOS 17 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing s...Rule Medium Severity -
PP-MDF-333070
Group -
Apple iOS/iPadOS 17 allow list must be configured to not include applications with the following characteristics: - backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services); - transmits MD diagnostic data to non-DOD servers; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.
Requiring all authorized applications to be in an application allow list prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the allow list. Failure to c...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.