UCF STIG Viewer Logo

Maximum passcode age must be set.


Overview

Finding ID Version Rule ID IA Controls Severity
V-25009 WIR-MOS-iOS-G-013 SV-30792r2_rule ECWN-1 IAIA-1 Low
Description
Sensitive DoD data could be compromised if a strong device unlock passcode is not set up on a DoD iOS device and the passcode is not changed periodically.
STIG Date
Apple iOS 6 Security Technical Implementation Guide (STIG) 2013-05-23

Details

Check Text ( C-31210r6_chk )
Password expiration is only required if the DAA deems it necessary due to the operational risk and mission need. It is most appropriate when, for whatever reason, the iOS device is outside of the user’s possession and readily accessible to others on a regular or periodic basis. If used, the recommended value is 120 days or less. If used, verify the setting has been set correctly using the following procedure:
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy.
2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Maximum passcode age" is checked and set to 120 days or less in the iOS security policy.

Mark as a finding if the required rule is not set up on the MDM server, if the DAA requires this setting.

Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix Text (F-27659r3_fix)
Set maximum passcode age to 120 days or less if the DAA requires this setting.