Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • PP-BYO-000070

    <GroupDescription></GroupDescription>
    Group
  • The EMM detection/monitoring system must use continuous monitoring of enrolled iOS/iPadOS 17 BYOAD.

    &lt;VulnDiscussion&gt;DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...
    Rule Medium Severity
  • PP-BYO-000080

    <GroupDescription></GroupDescription>
    Group
  • The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects native security controls are disabled.

    &lt;VulnDiscussion&gt;Examples of indicators that the native device security controls have been disabled include jailbroken or rooted devices. Whe...
    Rule Medium Severity
  • PP-BYO-000090

    <GroupDescription></GroupDescription>
    Group
  • The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects the BYOAD device has known malicious, blocked, or prohibited applications or is configured to access nonapproved managed third-party applications stores.

    &lt;VulnDiscussion&gt;When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD informati...
    Rule Medium Severity
  • PP-BYO-000100

    <GroupDescription></GroupDescription>
    Group
  • The iOS/iPadOS 17 BYOAD must be configured so that managed data and apps are removed if the device is no longer receiving security or software updates.

    &lt;VulnDiscussion&gt;When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD informati...
    Rule Medium Severity
  • PP-BYO-000110

    <GroupDescription></GroupDescription>
    Group
  • The BYOAD and DOD enterprise must be configured to limit access to only enterprise IT resources approved by the authorizing official (AO).

    &lt;VulnDiscussion&gt;Note: IT resources includes DOD networks and applications (for example, DOD email). The system administrator must have the c...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules