II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
PP-BYO-000020
<GroupDescription></GroupDescription>Group -
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured for autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline.
<VulnDiscussion>DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...Rule Medium Severity -
PP-BYO-000030
<GroupDescription></GroupDescription>Group -
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources.
<VulnDiscussion>DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...Rule Medium Severity -
PP-BYO-000040
<GroupDescription></GroupDescription>Group -
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if the BYOAD native security controls are disabled.
<VulnDiscussion>Examples of indicators that the device native security controls have been disabled include jailbroken or rooted devices. DOD...Rule Medium Severity -
PP-BYO-000050
<GroupDescription></GroupDescription>Group -
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if known malicious, blocked, or prohibited applications are installed on the BYOAD (DOD-managed segment only).
<VulnDiscussion>DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...Rule Medium Severity -
PP-BYO-000060
<GroupDescription></GroupDescription>Group -
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if the BYOAD is configured to access nonapproved third-party applications stores (DOD-managed segment only).
<VulnDiscussion>DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...Rule Medium Severity -
PP-BYO-000070
<GroupDescription></GroupDescription>Group -
The EMM detection/monitoring system must use continuous monitoring of enrolled iOS/iPadOS 17 BYOAD.
<VulnDiscussion>DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...Rule Medium Severity -
PP-BYO-000080
<GroupDescription></GroupDescription>Group -
The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects native security controls are disabled.
<VulnDiscussion>Examples of indicators that the native device security controls have been disabled include jailbroken or rooted devices. Whe...Rule Medium Severity -
PP-BYO-000090
<GroupDescription></GroupDescription>Group -
The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects the BYOAD device has known malicious, blocked, or prohibited applications or is configured to access nonapproved managed third-party applications stores.
<VulnDiscussion>When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD informati...Rule Medium Severity -
PP-BYO-000100
<GroupDescription></GroupDescription>Group -
The iOS/iPadOS 17 BYOAD must be configured so that managed data and apps are removed if the device is no longer receiving security or software updates.
<VulnDiscussion>When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD informati...Rule Medium Severity -
PP-BYO-000110
<GroupDescription></GroupDescription>Group -
The BYOAD and DOD enterprise must be configured to limit access to only enterprise IT resources approved by the authorizing official (AO).
<VulnDiscussion>Note: IT resources includes DOD networks and applications (for example, DOD email). The system administrator must have the c...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.