STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Apple iOS/iPad OS 16 MDFPP 3.3 BYOAD Security Technical Implementation Guide

V-257094

CAT I (High)

The BYOAD and DOD enterprise must be configured to limit access to only enterprise corporate-owned IT resources approved by the authorizing official (AO).

Rule ID

SV-257094r958472_rule

STIG

Apple iOS/iPad OS 16 MDFPP 3.3 BYOAD Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000213

Discussion

Note: IT resources includes DOD networks and applications (for example, DOD email). The system administrator must have the capability to limit access of the BYOAD to DOD networks and DOD IT resources based on mission needs and risk. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. The AO should document networks, IT resources, and enterprise applications that BYOAD can access. Examples of EMM security controls are as follows: 1. Device access restrictions: Restrict or isolate access based on the device's access type (i.e., from the internet), authentication type (e.g., password), credential strength, etc. 2. User and device activity monitoring: Configured to detect anomalous activity, malicious activity, and unauthorized attempts to access DOD information. 3. Device health tracking: Monitor device attestation, health, and agents reporting compromised applications, connections, intrusions, and/or signatures. Reference: DOD policy "Use of Non-Government Mobile Devices". 3.b.(2)ii. SFR ID: FMT_SMF_EXT.1.1 #47

Check Content

Verify the EMM system and DOD enterprise have been configured to limit iOS/iPadOS 16 BYOAD access to only AO-approved enterprise IT resources. 

The exact procedure will depend on the EMM system used and IT resources at the site.

If the EMM system and DOD enterprise have not been configured to limit iOS/iPadOS 16 BYOAD access to only AO-approved enterprise IT resources, this is a finding.

Fix Text

Configure the EEM system and DOD enterprise to limit iOS/iPadOS 16 BYOAD access to only AO-approved enterprise IT resources. 

The exact procedure will depend on the EMM system used and IT resources at the site.