| This is an iOS security policy set check. Recommend all checks related to iOS security policy set rules be reviewed using the following procedure. |
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy using the following procedure:
-Have the SA identify STIG compliant and non-compliant policies on the server.
--Log into the MDM server console.
--Click on the Policies tab.
--View all iOS security policies on the server.
-Note: STIG-compliant policy sets should be identified as such in the policy title. An example is STIG_iOS_Policy_Set. It is recommended that all non-STIG/ISCG policy sets be deleted.
2. Select each iOS security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy set.
-Note: If there is a finding, note the name of the non STIG/ISCG-compliant policy set in the Findings Details section in VMS/Component Provided Tracking Database.
-Launch the MDM console and click on the Policies tab.
-Select the iOS security policy.
The exact procedures will vary based on the MDM product used. For the Good server, verify the following:
-Verify a compliance rule has been set up defining required iOS 5 versions.
-Launch the Good Mobile Control Web console and click on the Policies tab.
-Select a policy set to review and click on the policy.
-On the left tab, select Compliance Manager.
-Verify “OS Version Verification” rule is listed. (Note that the rule title does not have to be exact.)
-Open the rule by checking the box next to the rule and then click on Edit.
-Verify the following are set:
Check to Run: OS Version Verification
-Verify the following are checked:
5.1.1 or later.
-Verify “Failure Action” is set to “Quit Good for Enterprise”.
-Verify “Check Every” is set to “1 hour”.
Mark as a finding if the “OS Version Verification” rule has not been set up or is not configured as required.