|Finding ID||Version||Rule ID||IA Controls||Severity|
|When dealing with access restrictions pertaining to change control, it should be noted that any changes to the hardware, software, and/or firmware components of the information system can potentially have significant effects on the overall security of the system. Mutual authentication ensures both that the device is authorized for provisioning and that a rogue provisioning server is not used to obtain software.|
|Apple iOS6 Security Technical Implementation Guide||2014-10-07|
|Check Text ( C-41063r5_chk )|
| The link between iOS 6 and Apple meets this requirement for iOS updates from Apple. |
Review the software loading process between the mobile device and the provisioning server (MDM and/or MAM) to determine if it meets the necessary assurance for mutual authentication. Acceptable mutual authentication mechanisms may include PKI or shared secret based systems. A review of product documentation may be necessary. Mark as a finding if the trusted loading process does not meet the criteria.
|Fix Text (F-36598r2_fix)|
| Configure the mobile operating system to authenticate the provisioning server prior to accepting provisioned software. |