U Apple iOS-iPadOS 17 BYOAD V1R1

ℹ️ The items you can view are limited because you do not have a subscription. Contact us at [email protected] to purchase one.

UNCLASSIFIED
Group Title
PP-BYO-000020
Group ID
V-259742
Rule Version
AIOS-17-800020
Rule Title
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured for autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline.
Rule ID
SV-259742r943551_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security baseline and managed data and apps can be removed when the device is out of compliance, which protects DOD data from unauthorized exposure.

Examples of possible EMM security controls are as follows:

1. Device access restrictions: Restrict or isolate access based on the device's access type (i.e., from the internet), authentication type (e.g., password), credential strength, etc.

2. User and device activity monitoring: Configured to detect anomalous activity, malicious activity, and unauthorized attempts to access DOD information.

3. Device health tracking: Monitor device attestation, health, and agents reporting compromised applications, connections, intrusions, and/or signatures.

Reference: DOD policy "Use of Non-Government Mobile Devices". 3.a.(3)ii, 3.b.(2)ii,1 and 2.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify the EMM system supporting the iOS/iPadOS 17 BYOAD has been configured to conduct autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline. The exact procedure will depend on the EMM system used at the site.

If the EMM system supporting the iOS/iPadOS 17 BYOAD has not been configured to conduct autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices, this is a finding.

Check System
C-63478r943549_chk
Fix Reference
F-63385r943550_fix
Fix Text

Configure the EMM system supporting the iOS/iPadOS 17 BYOAD to conduct autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline. The exact procedure will depend on the EMM system used at the site.

Identities
CCI-000366

Implement the security configuration settings.

  • 800-53 :: CM-6 b
  • 800-53 Rev. 4 :: CM-6 b
  • 800-53 Rev. 5 :: CM-6 b
  • 800-53A :: CM-6.1 (iv)
Group Title
PP-BYO-000030
Group ID
V-259743
Rule Version
AIOS-17-800030
Rule Title
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources.
Rule ID
SV-259743r943554_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security baseline and managed data and apps can be removed when the device is out of compliance, which protects DOD data from unauthorized exposure.

Reference: DOD policy "Use of Non-Government Mobile Devices". 3.a.(3)iii.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify the EMM system supporting the iOS/iPadOS 17 BYOAD has been configured to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources. The exact procedure will depend on the EMM system used at the site.

If the EMM system supporting the iOS/iPadOS 17 BYOAD has not been configured to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources, this is a finding.

Check System
C-63479r943552_chk
Fix Reference
F-63386r943553_fix
Fix Text

Configure the EMM system supporting the iOS/iPadOS 17 BYOAD to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources. The exact procedure will depend on the EMM system used at the site.

Identities
CCI-000366

Implement the security configuration settings.

  • 800-53 :: CM-6 b
  • 800-53 Rev. 4 :: CM-6 b
  • 800-53 Rev. 5 :: CM-6 b
  • 800-53A :: CM-6.1 (iv)
Group Title
PP-BYO-000040
Group ID
V-259744
Rule Version
AIOS-17-800040
Rule Title
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if the BYOAD native security controls are disabled.
Rule ID
SV-259744r943557_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

Examples of indicators that the device native security controls have been disabled include jailbroken or rooted devices.

DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security baseline and the work profile can be removed when the device is out of compliance, which protects DOD data from unauthorized exposure. Detection via collection and analysis of BYOAD-generated logs for noncompliance indicators is acceptable.

This detection capability must be implemented prior to BYOAD access to DOD information and IT resources and continuously monitored on the DOD-managed segment of the BYOAD enrolled in the program. If non-DOD information (i.e., personal user data, device information) outside the DOD-managed segment of the BYOAD is required to be accessed, collected, monitored, tracked (i.e., location), or maintained, the circumstances under which this may be done must be outlined in the user agreement.

Reference: DOD policy "Use of Non-Government Mobile Devices". 3.a.(3)iii.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify the EMM system supporting the iOS/iPadOS 17 BYOAD has been configured to detect if the BYOAD native security controls are disabled. The exact procedure will depend on the EMM system used at the site.

If the EMM system supporting the iOS/iPadOS 17 BYOAD is not configured to detect if the BYOAD native security controls are disabled, this is a finding.

Check System
C-63480r943555_chk
Fix Reference
F-63387r943556_fix
Fix Text

Configure the EMM system supporting the iOS/iPadOS 17 BYOAD to detect if the BYOAD native security controls are disabled. The exact procedure will depend on the EMM system used at the site.

Identities
CCI-000366

Implement the security configuration settings.

  • 800-53 :: CM-6 b
  • 800-53 Rev. 4 :: CM-6 b
  • 800-53 Rev. 5 :: CM-6 b
  • 800-53A :: CM-6.1 (iv)
Group Title
PP-BYO-000050
Group ID
V-259745
Rule Version
AIOS-17-800050
Rule Title
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if known malicious, blocked, or prohibited applications are installed on the BYOAD (DOD-managed segment only).
Rule ID
SV-259745r943560_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security baseline and managed data and apps can be removed when the device is out of compliance, which protects DOD data from unauthorized exposure. Detection via collection and analysis of BYOAD-generated logs for noncompliance indicators is acceptable.

This detection capability must be implemented prior to AMD (Approved Mobile Device, called BYOAD device in the STIG) enrollment and AMD access to DOD information and IT resources and continuously monitored on the DOD-managed segment of the AMD enrolled in the program. If non-DOD information (i.e., personal user data, device information) outside the DOD-managed segment of the AMD is required to be accessed, collected, monitored, tracked (i.e., location), or maintained, the circumstances under which this may be done must be outlined in the user agreement.

Reference: DOD policy "Use of Non-Government Mobile Devices". 3.a.(3)iii.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify an app vetting process is being used before managed apps are placed in the MDM app repository.

If an app vetting process is not being used before managed apps are placed in the MDM app repository, this is a finding.

Check System
C-63481r943558_chk
Fix Reference
F-63388r943559_fix
Fix Text

Implement an app vetting process before managed apps are placed in the MDM app repository.

Identities
CCI-000366

Implement the security configuration settings.

  • 800-53 :: CM-6 b
  • 800-53 Rev. 4 :: CM-6 b
  • 800-53 Rev. 5 :: CM-6 b
  • 800-53A :: CM-6.1 (iv)
Group Title
PP-BYO-000060
Group ID
V-259746
Rule Version
AIOS-17-800060
Rule Title
The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if the BYOAD is configured to access nonapproved third-party applications stores (DOD-managed segment only).
Rule ID
SV-259746r943563_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security baseline and managed data and apps can be removed when the device is out of compliance, which protects DOD data from unauthorized exposure. Detection via collection and analysis of BYOAD-generated logs for noncompliance indicators is acceptable.

This detection capability must be implemented prior to AMD (Approved Mobile Device, called BYOAD device in the STIG) enrollment and AMD access to DOD information and IT resources and continuously monitored on the DOD-managed segment of the AMD enrolled in the program. If non-DOD information (i.e., personal user data, device information) outside the DOD-managed segment of the AMD is required to be accessed, collected, monitored, tracked (i.e., location), or maintained, the circumstances under which this may be done must be outlined in the user agreement.

Reference: DOD policy "Use of Non-Government Mobile Devices". 3.a.(3)iii.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Review configuration settings to confirm "Allow Trusting New Enterprise App Authors" is disabled.

This procedure is performed in the Apple iOS/iPadOS management tool and on the iPhone and iPad.

Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review.

In the Management tool, verify "Allow Trusting New Enterprise App Authors" is disabled.

On the iPhone and iPad:

1. Open the Settings app.

2. Tap "General".

3. Tap "Profiles & Device Management" or "Profiles".

4. Tap the Configuration Profile from the Apple iOS/iPadOS management tool containing the restrictions policy.

5. Tap "Restrictions".

6. Verify "Trusting enterprise apps not allowed" is listed.

If "Allow Trusting New Enterprise App Authors" is not disabled in the iOS/iPadOS management tool or on the iPhone and iPad, this is a finding.

Note: This requirement is the same as AIOS-17-707000 in the Apple iOS/iPadOS 17 BYOAD STIG.

Check System
C-63482r943561_chk
Fix Reference
F-63389r943562_fix
Fix Text

Install a configuration profile to disable "Allow Trusting New Enterprise App Authors".

Note: This requirement is the same as AIOS-17-707000 in the Apple iOS/iPadOS 17 BYOAD STIG.

Identities
CCI-000366

Implement the security configuration settings.

  • 800-53 :: CM-6 b
  • 800-53 Rev. 4 :: CM-6 b
  • 800-53 Rev. 5 :: CM-6 b
  • 800-53A :: CM-6.1 (iv)
Group Title
PP-BYO-000070
Group ID
V-259747
Rule Version
AIOS-17-800070
Rule Title
The EMM detection/monitoring system must use continuous monitoring of enrolled iOS/iPadOS 17 BYOAD.
Rule ID
SV-259747r943566_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security baseline and managed data and apps can be removed when the device is out of compliance, which protects DOD data from unauthorized exposure. Detection via collection and analysis of BYOAD-generated logs for noncompliance indicators is acceptable.

This detection capability must be implemented prior to AMD (Approved Mobile Device, called BYOAD device in the STIG) enrollment and AMD access to DOD information and IT resources and continuously monitored on the DOD-managed segment of the AMD enrolled in the program. If non-DOD information (i.e., personal user data, device information) outside the DOD-managed segment of the AMD is required to be accessed, collected, monitored, tracked (i.e., location), or maintained, the circumstances under which this may be done must be outlined in the user agreement.

Reference: DOD policy "Use of Non-Government Mobile Devices". 3.a.(3)iii.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify the EMM detection/monitoring system is configured to use continuous monitoring of enrolled iOS/iPadOS 17 BYOAD. The exact procedure will depend on the EMM system used at the site.

If the EMM detection/monitoring system is not configured to use continuous monitoring of enrolled iOS/iPadOS 17 BYOAD, this is a finding.

Check System
C-63483r943564_chk
Fix Reference
F-63390r943565_fix
Fix Text

Configure the EMM detection/monitoring system to use continuous monitoring of enrolled iOS/iPadOS 17 BYOAD. The exact procedure will depend on the EMM system used at the site.

Identities
CCI-000366

Implement the security configuration settings.

  • 800-53 :: CM-6 b
  • 800-53 Rev. 4 :: CM-6 b
  • 800-53 Rev. 5 :: CM-6 b
  • 800-53A :: CM-6.1 (iv)
Group Title
PP-BYO-000080
Group ID
V-259748
Rule Version
AIOS-17-800080
Rule Title
The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects native security controls are disabled.
Rule ID
SV-259748r943569_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

Examples of indicators that the native device security controls have been disabled include jailbroken or rooted devices.

When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD information.

Note: The site should review DOD and local data retention policies before wiping the work profile of a BYOAD device.

Reference: DOD policy "Use of Non-Government Mobile Devices". 3.b.(4), 3.b.(5)i.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify the EMM has been configured to either disable access to DOD data, IT systems, and user accounts on the iOS/iPadOS 17 BYOAD or wipe managed data and apps if it has been detected that native BYOAD security controls are disabled (e.g., jailbroken/rooted).

When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site.

If the EMM has not been configured to either disable access to DOD data, IT systems, and user accounts on the iOS/iPadOS 17 BYOAD or wipe managed data and apps if it has been detected that native BYOAD security controls are disabled, this is a finding.

Check System
C-63484r943567_chk
Fix Reference
F-63391r943568_fix
Fix Text

Configure the EMM to either disable access to DOD data, IT systems, and user accounts on the iOS/iPadOS 17 BYOAD or wipe managed data and apps if it has been detected that native iOS/iPadOS 17 BYOAD security controls are disabled (e.g., jailbroken/rooted). The exact procedure will depend on the EMM system used at the site.

Note: When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well.

Identities
CCI-000366

Implement the security configuration settings.

  • 800-53 :: CM-6 b
  • 800-53 Rev. 4 :: CM-6 b
  • 800-53 Rev. 5 :: CM-6 b
  • 800-53A :: CM-6.1 (iv)
Group Title
PP-BYO-000090
Group ID
V-259749
Rule Version
AIOS-17-800090
Rule Title
The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects the BYOAD device has known malicious, blocked, or prohibited applications or is configured to access nonapproved managed third-party applications stores.
Rule ID
SV-259749r943572_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD information.

Reference: DOD policy "Use of Non-Government Mobile Devices". 3.a.(3)iii.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify the EMM system has been configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if it has detected the iOS/iPadOS 17 BYOAD device has known malicious, blocked, or prohibited managed applications or is configured to access nonapproved third-party applications stores for managed apps.

When the Work profile is wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site.

If the EMM system has not been configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if it has detected the iOS/iPadOS 17 BYOAD device has known malicious, blocked, or prohibited managed applications or is configured to access nonapproved third-party applications stores for managed apps, this is a finding.

Check System
C-63485r943570_chk
Fix Reference
F-63392r943571_fix
Fix Text

Configure the EMM system to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if it has detected the iOS/iPadOS 17 BYOAD device has known malicious, blocked, or prohibited managed applications or is configured to access nonapproved third-party applications stores for managed apps.

Note: When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site.

Identities
CCI-000366

Implement the security configuration settings.

  • 800-53 :: CM-6 b
  • 800-53 Rev. 4 :: CM-6 b
  • 800-53 Rev. 5 :: CM-6 b
  • 800-53A :: CM-6.1 (iv)
Group Title
PP-BYO-000100
Group ID
V-259750
Rule Version
AIOS-17-800100
Rule Title
The iOS/iPadOS 17 BYOAD must be configured so that managed data and apps are removed if the device is no longer receiving security or software updates.
Rule ID
SV-259750r943575_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD information.

Reference: DOD policy "Use of Non-Government Mobile Devices". 3.b.(1)ii.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify the EMM system is configured to wipe managed data and apps if the iOS/iPadOS 17 BYOAD is no longer receiving security or software updates.

When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site.

If the EMM system is not configured to wipe managed data and apps if the iOS/iPadOS 17 BYOAD is no longer receiving security or software updates, this is a finding.

Check System
C-63486r943573_chk
Fix Reference
F-63393r943574_fix
Fix Text

Configure the EMM system so managed data and apps are removed if the iOS/iPadOS 17 BYOAD is no longer receiving security or software updates.

Note: When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site.

Identities
CCI-000366

Implement the security configuration settings.

  • 800-53 :: CM-6 b
  • 800-53 Rev. 4 :: CM-6 b
  • 800-53 Rev. 5 :: CM-6 b
  • 800-53A :: CM-6.1 (iv)
Group Title
PP-BYO-000150
Group ID
V-259754
Rule Version
AIOS-17-800150
Rule Title
The iOS/iPadOS 17 BYOAD must be deployed in Device Enrollment mode or User Enrollment mode.
Rule ID
SV-259754r943587_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security baseline and the work profile can be removed when the device is out of compliance, which protects DOD data from unauthorized exposure.

Note: Technical limitations prohibit using Apple iOS/iPadOS User Enrollment in most DOD environments.

Reference: DOD policy "Use of Non-Government Mobile Devices". 

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify iOS/iPadOS 17 BYOAD has been deployed in Device Enrollment mode or User Enrollment mode.

This procedure is performed on the iPhone and iPad.

For Device Enrollment:

1. On the device, go to Settings >> General >> VPN & Device Management.

2. Verify a Mobile Device Management profile is installed on the device.

For User Enrollment:

1. On the device, go to Settings >> General >> VPN & Device Management.

2. Verify a Mobile Device Management profile is installed on the device.

3. On the device, go to "Settings" and click on the User icon.

4. Verify a work AppleID is listed.

If the iOS/iPadOS 17 BYOAD has not been deployed in Device Enrollment mode or User Enrollment mode, this is a finding.

Check System
C-63490r943585_chk
Fix Reference
F-63397r943586_fix
Fix Text

Deploy iOS/iPadOS 17 BYOAD in Device Enrollment mode or User Enrollment mode.

The exact procedure will depend on the EMM system used at the site.

Identities
CCI-000213

Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

  • 800-53 :: AC-3
  • 800-53 Rev. 4 :: AC-3
  • 800-53 Rev. 5 :: AC-3
  • 800-53A :: AC-3.1
Group Title
PP-BYO-000220
Group ID
V-259757
Rule Version
AIOS-17-800220
Rule Title
The DOD Mobile Service Provider must not allow BYOADs in facilities where personally owned mobile devices are prohibited.
Rule ID
SV-259757r943596_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security baseline and managed data and apps can be removed when the device is out of compliance, which protects DOD data from unauthorized exposure.

Follow local physical security procedures regarding allowing or prohibiting personally owned mobile devices in a DOD facility. If BYOAD devices are brought into facilities where the authorizing official (AO) has determined the risk of using personal devices is unacceptable, this could lead to the exposure of sensitive DOD data.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Verify the DOD Mobile Service Provider or information system security officer (ISSO)/information system security manager (ISSM) do not allow BYOADs in facilities where personally owned mobile devices are prohibited.

If the DOD Mobile Service Provider or ISSO/ISSM allows BYOADs in facilities where personally owned mobile devices are prohibited, this is a finding.

Check System
C-63493r943594_chk
Fix Reference
F-63400r943595_fix
Fix Text

Do not allow BYOADs in facilities where personally owned mobile devices are prohibited.

Identities
CCI-000382

Configure the system to prohibit or restrict the use of organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services.

  • 800-53 :: CM-7
  • 800-53 Rev. 4 :: CM-7 b
  • 800-53 Rev. 5 :: CM-7 b
  • 800-53A :: CM-7.1 (iii)
Group Title
PP-BYO-000230
Group ID
V-259758
Rule Version
AIOS-17-800230
Rule Title
The iOS/iPadOS 17 BYOAD must be configured to disable device cameras and/or microphones when brought into DOD facilities where mobile phone cameras and/or microphones are prohibited.
Rule ID
SV-259758r943599_rule
Rule Severity
Medium
Rule Weight
10.0
Vuln Discussion

In some DOD operational environments, the use of the mobile device camera or microphone could lead to a security incident or compromise of DOD information. The system administrator must have the capability to disable the mobile device camera and/or microphone based on mission needs. Alternatively, mobile devices with cameras or microphones that cannot be disabled must be prohibited from the facility by the information system security officer (ISSO)/information system security manager (ISSM).

If BYOAD devices are brought into facilities where the authorizing official (AO) has determined the risk of using mobile device cameras or microphones is unacceptable, this could lead to the exposure of sensitive DOD data.

SFR ID: FMT_SMF_EXT.1.1 #47

Documentable
False
Check Content

Determine if iOS/iPadOS 17 BYOADs are prohibited in DOD facilities that prohibit mobile devices with cameras and microphones.

Refer to the site Facility Security Standard Operating Procedure (SOP) to determine site requirements.

If for DOD sites that prohibit mobile devices with cameras and microphones, the ISSO/ISSM has not prohibited iOS/iPadOS 17 BYOADs from the facility, this is a finding.

Check System
C-63494r943597_chk
Fix Reference
F-63401r943598_fix
Fix Text

Do not allow iOS iPadOS 17 BYOADs in DOD facilities where mobile phone cameras and/or microphones are prohibited.

Refer to the site Facility Security SOP to determine site requirements.

Identities
CCI-000382

Configure the system to prohibit or restrict the use of organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services.

  • 800-53 :: CM-7
  • 800-53 Rev. 4 :: CM-7 b
  • 800-53 Rev. 5 :: CM-7 b
  • 800-53A :: CM-7.1 (iii)
UNCLASSIFIED