UCF STIG Viewer Logo

Remote full device wipe must be enabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27635 WIR-MOS-iOS-G-008 SV-35228r2_rule ECCR-1 ECWN-1 Medium
Description
Sensitive DoD data could be compromised if mobile OS device data could not be wiped when directed by the system administrator.
STIG Date
Apple iOS 6 Security Technical Implementation Guide (STIG) 2013-05-23

Details

Check Text ( C-35072r5_chk )
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy.
2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify the MDM has a setting that will wipe all data and non-core applications when a wipe commend is sent to managed mobile devices.

Mark as a finding if the required rule is not set up on the MDM server.

Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.

If the Good Technology MDM server is used, complete the following:
-Verify "Enable remote full device wipe" is checked.
Fix Text (F-30358r2_fix)
Enable remote full device wipe on iOS devices.