Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • PP-MDF-333250

    Group
  • Apple iOS/iPadOS 17 must not allow backup to remote systems (managed applications data stored in iCloud).

    If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploi...
    Rule Medium Severity
  • PP-MDF-333250

    Group
  • Apple iOS/iPadOS 17 must not allow backup to remote systems (enterprise books).

    If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploi...
    Rule Medium Severity
  • PP-MDF-333024

    Group
  • Apple iOS/iPadOS 17 must be configured to enforce a minimum password length of six characters.

    Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a function of how many attempts an adversary is p...
    Rule Medium Severity
  • PP-MDF-333025

    Group
  • Apple iOS/iPadOS 17 must be configured to not allow passwords that include more than four repeating or sequential characters.

    Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. Passwords that contain repeating or sequential characters are significantly easier t...
    Rule Medium Severity
  • PP-MDF-333026

    Group
  • Apple iOS/iPadOS 17 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.

    The screen-lock timeout helps protect the device from unauthorized access. Devices without a screen-lock timeout provide an opportunity for adversaries who gain physical access to the mobile device...
    Rule Medium Severity
  • PP-MDF-333030

    Group
  • Apple iOS/iPadOS 17 must be configured to lock the display after 15 minutes (or less) of inactivity.

    The screen lock timeout must be set to a value that helps protect the device from unauthorized access. Having a too-long timeout would increase the window of opportunity for adversaries who gain ph...
    Rule Medium Severity
  • PP-MDF-333040

    Group
  • Apple iOS/iPadOS 17 must be configured to not allow more than 10 consecutive failed authentication attempts.

    The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of at...
    Rule Medium Severity
  • PP-MDF-993300

    Group
  • Apple iOS/iPadOS 17 must be configured to enforce a passcode reuse prohibition of at least two generations.

    iOS/iPadOS 17 includes a new feature that allows the previous passcode to be valid for 72 hours after a passcode change. If the previous passcode has been compromised and the attacker has access to...
    Rule High Severity
  • PP-MDF-333050

    Group
  • Apple iOS/iPadOS 17 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].

    Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing s...
    Rule Medium Severity
  • PP-MDF-333070

    Group
  • Apple iOS/iPadOS 17 allow list must be configured to not include applications with the following characteristics: - backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services); - transmits MD diagnostic data to non-DOD servers; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.

    Requiring all authorized applications to be in an application allow list prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the allow list. Failure to c...
    Rule Medium Severity
  • PP-MDF-333080

    Group
  • Apple iOS/iPadOS 17 must be configured to not display notifications when the device is locked.

    Many mobile devices display notifications on the lock screen so users can obtain relevant information in a timely manner without having to frequently unlock the phone to determine if there are new ...
    Rule Medium Severity
  • PP-MDF-333080

    Group
  • Apple iOS/iPadOS 17 must not display notifications (calendar information) when the device is locked.

    Many mobile devices display notifications on the lock screen so users can obtain relevant information in a timely manner without having to frequently unlock the phone to determine if there are new ...
    Rule Medium Severity
  • PP-MDF-333160

    Group
  • Apple iOS/iPadOS 17 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.

    Before granting access to the system, the mobile operating system is required to display the DOD-approved system use notification message or banner that provides privacy and security notices consis...
    Rule Low Severity
  • PP-MDF-333240

    Group
  • Apple iOS/iPadOS 17 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.

    Data on mobile devices is protected by numerous mechanisms, including user authentication, access control, and cryptography. When the data is backed up to an external system (either locally connect...
    Rule Medium Severity
  • PP-MDF-333280

    Group
  • Apple iOS/iPadOS 17 must not allow non-DOD applications to access DOD data.

    App data sharing gives apps the ability to access the data of other apps for enhanced user functionality. However, sharing also poses a significant risk that unauthorized users or apps will obtain ...
    Rule Medium Severity
  • PP-MDF-333300

    Group
  • Apple iOS/iPadOS 17 must be configured to [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.

    When a mobile device is no longer going to be managed by MDM technologies, its protected/sensitive data must be sanitized because it will no longer be protected by the MDM software, putting it at m...
    Rule Medium Severity
  • PP-MDF-333310

    Group
  • Apple iOS/iPadOS 17 must be configured to [selection: remove Enterprise applications, remove all noncore applications (any nonfactory installed application)] upon unenrollment from MDM.

    When a mobile device will no longer be managed by MDM technologies, its protected/sensitive data must be sanitized because it will no longer be protected by the MDM software, putting it at much gre...
    Rule Medium Severity
  • PP-MDF-993300

    Group
  • Apple iOS/iPadOS 17 must require a valid password be successfully entered before the mobile device data is unencrypted.

    Passwords provide a form of access control that prevents unauthorized individuals from accessing computing resources and sensitive data. Passwords may also be a source of entropy for generation of ...
    Rule High Severity
  • PP-MDF-993300

    Group
  • Apple iOS/iPadOS 17 must implement the management setting: Encrypt backups/Encrypt local backup.

    If iCloud backups are not encrypted, this could lead to the unauthorized disclosure of DOD sensitive information if non-DOD personnel are able to access that machine. Forcing the backup to be encry...
    Rule Medium Severity
  • PP-MDF-993300

    Group
  • Apple iOS/iPadOS 17 must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device.

    When a user is allowed to use AirPlay without a password, it may mistakenly associate the iPhone and iPad with an AirPlay-enabled device other than the one intended (i.e., by choosing the wrong one...
    Rule Low Severity
  • PP-MDF-993300

    Group
  • Apple iOS/iPadOS 17 must implement the management setting: require passcode for incoming Airplay connection requests.

    When an incoming AirPlay request is allowed without a password, it may mistakenly associate the iPhone and iPad with an AirPlay-enabled device other than the one intended (i.e., by choosing the wro...
    Rule Low Severity
  • PP-MDF-993300

    Group
  • iPhone and iPad must have the latest available iOS/iPadOS operating system installed.

    Required security features are not available in earlier OS versions. In addition, earlier versions may have known vulnerabilities. SFR ID: FMT_SMF_EXT.1.1 #47
    Rule High Severity
  • PP-MDF-993300

    Group
  • Apple iOS/iPadOS 17 must implement the management setting: use SSL for Exchange ActiveSync.

    Exchange email messages are a form of data in transit and thus are vulnerable to eavesdropping and man-in-the-middle attacks. Secure Sockets Layer (SSL), also referred to as Transport Layer Securit...
    Rule Medium Severity
  • PP-MDF-993300

    Group
  • Apple iOS/iPadOS 17 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 17 Mail app.

    The Apple iOS/iPadOS Mail app can be configured to support multiple email accounts concurrently. These email accounts are likely to involve content of varying degrees of sensitivity (e.g., both per...
    Rule Medium Severity
  • PP-MDF-993300

    Group
  • Apple iOS/iPadOS 17 must implement the management setting: Treat AirDrop as an unmanaged destination.

    AirDrop is a way to send contact information or photos to other users with AirDrop enabled. This feature enables a possible attack vector for adversaries to exploit. Once the attacker has gained ac...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules