UCF STIG Viewer Logo

The mobile device passcode/password history setting must be set.


Overview

Finding ID Version Rule ID IA Controls Severity
V-25018 WIR-MOS-iOS-G-015 SV-30794r2_rule IAIA-1 Low
Description
The passcode would be more susceptible to compromise if the user can select frequently used passcodes.
STIG Date
Apple iOS 6 Interim Security Configuration Guide (ISCG) 2013-01-17

Details

Check Text ( C-31212r7_chk )
Password history is only required if the DAA deems it necessary for passwords to expire due to the operational risk and mission need. If used, the recommended value is 3 or more. If used, verify the setting has been set correctly using the following procedure:
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy.
2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify “Passcode history” is checked and set to 3 or more in the iOS security policy.

Mark as a finding if the required rule is not set up on the MDM server, if the DAA requires this setting.

Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix Text (F-27689r4_fix)
Set the mobile device passcode history setting to 3 or more if the DAA requires this setting.