STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Apple visionOS 2 Security Technical Implementation Guide

V-276377

CAT II (Medium)

Apple visionOS 2 must not allow backup to remote systems (iCloud Keychain).

Rule ID

SV-276377r1146627_rule

STIG

Apple visionOS 2 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001090

Discussion

If a user can configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFR ID: FMT_MOF_EXT.1.2 #40

Check Content

Note: This requirement is not applicable if the authorizing official (AO) has approved users' full access to the Apple App Store for downloading unmanaged (personal) apps and syncing personal data on the device with personal cloud data storage accounts. The site must have an AO-signed document showing the AO has assumed the risk for users' full access to the Apple App Store. 

This is a supervised-only control. If the Vision Pro being reviewed is not supervised by the MDM, this control is automatically a finding.

If the Vision Pro being reviewed is supervised by the MDM, review configuration settings to confirm iCloud keychain is disabled.

This check procedure is performed on both the Apple visionOS management tool and the Vision Pro. 

Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review.

In the Apple visionOS management tool, verify "Allow iCloud keychain" is unchecked.

Alternatively, verify the text "<key>allowCloudKeychainSync</key><false/>" appears in the configuration profile (.mobileconfig file).

On the Vision Pro:
1. Open the Settings app.
2. Tap "General".
3. Tap "VPN & Device Management".
4. Tap the configuration profile from the visionOS management tool containing the management policy.
5. Verify "iCloud Keychain not allowed" is listed.

If "Allow iCloud keychain" is checked in the Apple visionOS management tool, "<key>allowCloudKeychainSync</key><true/>" appears in the configuration profile, or "iCloud Keychain not allowed" is not listed on the Vision Pro, this is a finding.

Fix Text

Install a configuration profile to disable iCloud keychain. This is a supervised-only control.