UCF STIG Viewer Logo

The EMM detection/monitoring system must use continuous monitoring of enrolled iOS/iPadOS 16 BYOAD.


Overview

Finding ID Version Rule ID IA Controls Severity
V-257090 AIOS-16-800070 SV-257090r904015_rule Medium
Description
DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security baseline and managed data and apps can be removed when the device is out of compliance, which protects DOD data from unauthorized exposure. Detection via collection and analysis of BYOAD-generated logs for noncompliance indicators is acceptable. This detection capability must be implemented prior to AMD (Approved Mobile Device, called BYOAD device in the STIG) enrollment and AMD access to DOD information and IT resources and continuously monitored on the DOD-managed segment of the AMD enrolled in the program. If non-DOD information (i.e., personal user data, device information) outside the DOD-managed segment of the AMD is required to be accessed, collected, monitored, tracked (i.e., location), or maintained, the circumstances under which this may be done must be outlined in the user agreement. Reference: DOD policy "Use of Non-Government Mobile Devices". 3.a.(3)iii. SFR ID: FMT_SMF_EXT.1.1 #47
STIG Date
Apple iOS/iPad OS 16 MDFPP 3.3 BYOAD Security Technical Implementation Guide 2023-08-14

Details

Check Text ( C-60775r904013_chk )
Verify the EMM detection/monitoring system is configured to use continuous monitoring of enrolled iOS/iPadOS 16 BYOAD. The exact procedure will depend on the EMM system used at the site.

If the EMM detection/monitoring system is not configured to use continuous monitoring of enrolled iOS/iPadOS 16 BYOAD, this is a finding.
Fix Text (F-60716r904014_fix)
Configure the EMM detection/monitoring system to use continuous monitoring of enrolled iOS/iPadOS 16 BYOAD. The exact procedure will depend on the EMM system used at the site.