CIS Apple iOS 15 and iPadOS 15 Benchmark v1.1.0
CIS Apple iOS 15 and iPadOS 15 Benchmark v1.1.0
iPadOS 15 Benchmark
v1.1.0 - 05-31-2022
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/
Page 1
Table of Contents
Terms of Use ..................................................................................................................... 1
Table of Contents ............................................................................................................. 2
Overview ............................................................................................................................ 6
Intended Audience ..................................................................................................................... 6
Consensus Guidance................................................................................................................. 7
Typographical Conventions ...................................................................................................... 8
Recommendation Definitions ......................................................................................... 9
Title............................................................................................................................................... 9
Assessment Status .................................................................................................................... 9
Automated ............................................................................................................................................... 9
Manual...................................................................................................................................................... 9
Profile ........................................................................................................................................... 9
Description .................................................................................................................................. 9
Rationale Statement ................................................................................................................... 9
Impact Statement...................................................................................................................... 10
Audit Procedure........................................................................................................................ 10
Remediation Procedure ........................................................................................................... 10
Default Value ............................................................................................................................. 10
References ................................................................................................................................ 10
CIS Critical Security Controls® (CIS Controls®) .................................................................... 10
Additional Information ............................................................................................................. 10
Profile Definitions ..................................................................................................................... 11
Acknowledgements .................................................................................................................. 12
Recommendations ......................................................................................................... 13
1 Benchmark Guidance ........................................................................................................... 13
2 Configuration Profile Recommendations for End User-Owned Devices ....................... 14
2.1 General ............................................................................................................................................ 15
2.1.1 (L1) Ensure a "Consent Message" has been "Configured" (Automated) ........................................... 16
2.1.2 (L1) Ensure "Controls when the profile can be removed" is set to "Always" (Automated) ................. 18
2.2 Restrictions ..................................................................................................................................... 20
2.2.1 Functionality .............................................................................................................................. 21
2.2.1.1 (L1) Ensure "Allow voice dialing while device is locked" is set to "Disabled" (Automated) ............. 22
2.2.1.2 (L1) Ensure "Allow Siri while device is locked" is set to "Disabled" (Automated) ............................ 24
2.2.1.3 (L1) Ensure "Allow managed apps to store data in iCloud" is set to "Disabled" (Automated) ......... 26
2.2.1.4 (L1) Ensure "Force encrypted backups" is set to "Enabled" (Automated) ....................................... 28
2.2.1.5 (L1) Ensure "Allow personalized ads delivered by Apple" is set to "Disabled" (Manual) ................ 30
Page 2
2.2.1.6 (L2) Ensure "Allow users to accept untrusted TLS certificates" is set to "Disabled" (Automated) .. 32
2.2.1.7 (L1) Ensure "Force automatic date and time" is set to "Enabled" (Manual) .................................... 34
2.2.1.8 (L1) Ensure "Allow documents from managed sources in unmanaged destinations" is set to
"Disabled" (Automated) ............................................................................................................................... 36
2.2.1.9 (L1) Ensure "Allow documents from unmanaged sources in managed destinations" is set to
"Disabled" (Automated) ............................................................................................................................... 38
2.2.1.10 (L1) Ensure "Treat AirDrop as unmanaged destination" is set to "Enabled" (Automated) ............ 40
2.2.1.11 (L2) Ensure "Allow Handoff" is set to "Disabled" (Automated) ...................................................... 42
2.2.1.12 (L1) Ensure "Allow sending diagnostic and usage data to Apple" is set to "Disabled" (Manual) .. 44
2.2.1.13 (L1) Ensure "Force Apple Watch wrist detection" is set to "Enabled" (Automated) ...................... 46
2.2.1.14 (L1) Ensure "Show Control Center in Lock screen" is set to "Disabled" (Automated) ................... 48
2.2.1.15 (L1) Ensure "Show Notification Center in Lock screen" is set to "Disabled" (Automated) ............ 50
2.2.2 Applications ............................................................................................................................... 52
2.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled" (Automated) ............................................... 53
2.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I visit" or "From current website only"
(Automated)................................................................................................................................................. 55
2.3 Domains ........................................................................................................................................... 57
2.3.1 (L1) Ensure "Managed Safari Web Domains" is "Configured" (Manual) ............................................ 58
2.4 Passcode ......................................................................................................................................... 60
2.4.1 (L1) Ensure "Allow simple value" is set to "Disabled" (Automated) .................................................... 61
2.4.2 (L2) Ensure "Require alphanumeric value" is set to "Enabled" (Manual) ........................................... 63
2.4.3 (L1) Ensure "Minimum passcode length" is set to a value of "6" or greater (Automated) .................. 65
2.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes" or less (Automated) ................................... 67
2.4.5 (L1) Ensure "Maximum grace period for device lock" is set to "Immediately" (Automated) ............... 69
2.4.6 (L1) Ensure "Maximum number of failed attempts" is set to "6" (Automated) .................................... 71
2.5 Wi-Fi ................................................................................................................................................. 73
2.5.1 (L1) Ensure "Disable Association MAC Randomization" is "Configured" (Manual) ............................ 74
2.6 VPN................................................................................................................................................... 76
2.6.1 (L1) Ensure "VPN" is "Configured" (Manual) ...................................................................................... 77
2.7 Mail ................................................................................................................................................... 80
2.7.1 (L1) Ensure "Allow user to move messages from this account" is set to "Disabled" (Automated) ..... 81
2.7.2 (L2) Ensure "Allow Mail Drop" is set to "Disabled" (Automated) ........................................................ 83
2.8 Notifications .................................................................................................................................... 85
2.8.1 (L1) Ensure "Notification Settings" are configured for all "Managed Apps" (Manual) ........................ 86
Page 3
3.2.1.13 (L2) Ensure "Allow users to accept untrusted TLS certificates" is set to "Disabled" (Automated)
.................................................................................................................................................................. 119
3.2.1.14 (L1) Ensure "Allow trusting new enterprise app authors" is set to "Disabled" (Manual) .............. 121
3.2.1.15 (L1) Ensure "Allow installing configuration profiles" is set to "Disabled" (Automated) ................ 123
3.2.1.16 (L1) Ensure "Allow adding VPN configurations" is set to "Disabled" (Automated) ...................... 125
3.2.1.17 (L1) Ensure "Force automatic date and time" is set to "Enabled" (Manual) ................................ 127
3.2.1.18 (L2) Ensure "Allow modifying cellular data app settings" is set to "Disabled" (Automated) ........ 129
3.2.1.19 (L1) Ensure "Allow USB accessories while the device is locked" is set to "Disabled" (Automated)
.................................................................................................................................................................. 131
3.2.1.20 (L2) Ensure "Allow pairing with non-Configurator hosts" is set to "Disabled" (Automated) ......... 133
3.2.1.21 (L1) Ensure "Allow documents from managed sources in unmanaged destinations" is set to
"Disabled" (Automated) ............................................................................................................................. 135
3.2.1.22 (L1) Ensure "Allow documents from unmanaged sources in managed destinations" is set to
"Disabled" (Automated) ............................................................................................................................. 137
3.2.1.23 (L1) Ensure "Treat AirDrop as unmanaged destination" is set to "Enabled" (Automated) .......... 139
3.2.1.24 (L1) Ensure "Allow Handoff" is set to "Disabled" (Automated) .................................................... 141
3.2.1.25 (L1) Ensure "Allow sending diagnostic and usage data to Apple" is set to "Disabled" (Manual) 143
3.2.1.26 (L1) Ensure "Require Touch ID / Face ID authentication before AutoFill" is set to "Enabled"
(Automated)............................................................................................................................................... 145
3.2.1.27 (L1) Ensure "Force Apple Watch wrist detection" is set to "Enabled" (Automated) .................... 147
3.2.1.28 (L1) Ensure "Allow setting up new nearby devices" is set to "Disabled" (Automated) ................ 149
3.2.1.29 (L1) Ensure "Allow proximity based password sharing requests" is set to "Disabled" (Automated)
.................................................................................................................................................................. 151
3.2.1.30 (L1) Ensure "Allow password sharing (supervised only)" is set to "Disabled" (Manual) .............. 153
3.2.1.31 (L1) Ensure "Show Control Center in Lock screen" is set to "Disabled" (Automated) ................. 155
3.2.1.32 (L1) Ensure "Show Notification Center in Lock screen" is set to "Disabled" (Automated) .......... 157
3.2.2 Apps .........................................................................................................................................159
3.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled" (Automated) ............................................. 160
3.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I visit" or "From current website only"
(Automated)............................................................................................................................................... 162
3.3 Domains .........................................................................................................................................164
3.3.1 (L1) Ensure "Managed Safari Web Domains" is "Configured" (Manual) .......................................... 165
3.4 Passcode .......................................................................................................................................167
3.4.1 (L1) Ensure "Allow simple value" is set to "Disabled" (Automated) .................................................. 168
3.4.2 (L2) Ensure "Require alphanumeric value" is set to "Enabled" (Manual) ......................................... 170
3.4.3 (L1) Ensure "Minimum passcode length" is set to a value of "6" or greater (Automated) ................ 172
3.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes" or less (Automated) ................................. 174
3.4.5 (L1) Ensure "Maximum grace period for device lock" is set to "Immediately" (Automated) ............. 176
3.4.6 (L1) Ensure "Maximum number of failed attempts" is set to "6" (Automated) .................................. 178
3.5 Wi-Fi ...............................................................................................................................................180
3.5.1 (L1) Ensure "Disable Association MAC Randomization" is "Configured" (Manual) .......................... 181
3.6 VPN.................................................................................................................................................183
3.6.1 (L1) Ensure "VPN" is "Configured" (Manual) .................................................................................... 184
3.7 Mail .................................................................................................................................................187
3.7.1 (L1) Ensure "Allow user to move messages from this account" is set to "Disabled" (Automated) ... 188
3.7.2 (L2) Ensure 'Allow Mail Drop' is set to 'Disabled' (Automated) ......................................................... 190
3.8 Notifications ..................................................................................................................................192
3.8.1 (L1) Ensure "Notification Settings" are configured for all "Managed Apps" (Automated) ................. 193
3.9 Lock Screen Message ..................................................................................................................195
3.9.1 (L1) Ensure "If Lost, Return to..." Message is "Configured" (Manual) .............................................. 196
Page 4
4.2 (L1) Ensure "Install iOS Updates" of "Automatic Updates" is set to "Enabled" (Automated) .............. 201
4.3 (L1) Ensure "Software Update" returns "Your software is up to date." (Automated) ........................... 203
4.4 (L1) Review "iCloud Private Relay" settings (Manual) ........................................................................ 205
4.5 (L1) Review "Mail Privacy Protection" settings (Manual) .................................................................... 208
4.6 (L1) Ensure "Automatic Downloads" of "App Updates" is set to "Enabled" (Automated) .................... 210
4.7 (L1) Ensure "Find My iPhone/iPad" is set to "Enabled" on end user-owned devices (Automated) ..... 211
4.8 (L2) Ensure the latest iOS device architecture is used by high-value targets (Manual) ...................... 213
Page 5
Overview
All CIS Benchmarks focus on technical configuration settings used to maintain and/or
increase the security of the addressed technology, and they should be used in
conjunction with other essential cyber hygiene tasks like:
• Monitoring the base operating system for vulnerabilities and quickly updating with
the latest security patches
• Monitoring applications and libraries for vulnerabilities and quickly updating with
the latest security patches
In the end, the CIS Benchmarks are designed as a key component of a comprehensive
cybersecurity program.
This document, Security Configuration Benchmark for Apple iOS 15 and iPadOS 15,
provides prescriptive guidance for establishing a secure configuration posture for both
Apple iOS and iPadOS version 15. This guide was tested against Apple iOS 15.0 and
iPadOS 15.0 using Apple Configurator v2.14. This benchmark covers Apple iOS 15 and
iPadOS 15 on all supported devices. As of the publication of these guidelines, devices
supported by iOS 15 or iPadOS 15 include the following:
iPhone 6s and later • iPod touch (7th generation) and later • iPad Pro and later • iPad
(5th generation) • iPad Air 2 • iPad mini 4 and later
The current guidance considers iOS and iPadOS devices as having the same use
cases and threat scenarios when determining recommendations. In nearly all instances,
the configuration steps, default settings, and benchmark recommended settings are
identical regardless of hardware platform or operating system. For the few cases where
variation exists, the benchmark notes differences within the respective section. To
obtain the latest version of this guide, please visit http://cisecurity.org. If you have
questions, comments, or have identified ways to improve this guide, please write us at
[email protected].
Intended Audience
This document is intended for system and application administrators, security
specialists, auditors, help desk, end users, and platform deployment personnel who
plan to use, develop, deploy, assess, or secure solutions that incorporate the Apple iOS
15 or iPadOS 15.
Page 6
Consensus Guidance
This CIS Benchmark was created using a consensus review process comprised of a
global community of subject matter experts. The process combines real world
experience with data-based information to create technology specific guidance to assist
users to secure their environments. Consensus participants provide perspective from a
diverse set of backgrounds including consulting, software development, audit and
compliance, security research, operations, government, and legal.
Each CIS Benchmark undergoes two phases of consensus review. The first phase
occurs during initial Benchmark development. During this phase, subject matter experts
convene to discuss, create, and test working drafts of the Benchmark. This discussion
occurs until consensus has been reached on Benchmark recommendations. The
second phase begins after the Benchmark has been published. During this phase, all
feedback provided by the Internet community is reviewed by the consensus team for
incorporation in the Benchmark. If you are interested in participating in the consensus
process, please visit https://workbench.cisecurity.org/.
Page 7
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Page 8
Recommendation Definitions
The following defines the various components included in a CIS recommendation as
applicable. If any of the components are not applicable it will be noted or the
component will not be included in the recommendation.
Title
Concise description for the recommendation's intended configuration.
Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual
steps to implement. Both statuses are equally important and are determined and
supported as defined below:
Automated
Represents recommendations for which assessment of a technical control can be fully
automated and validated to a pass/fail state. Recommendations will include the
necessary information to implement automation.
Manual
Represents recommendations for which assessment of a technical control cannot be
fully automated and requires all or some manual steps to validate that the configured
state is set as expected. The expected state can vary depending on the environment.
Profile
A collection of recommendations for securing a technology or a supporting platform.
Most benchmarks include at least a Level 1 and Level 2 Profile. Level 2 extends Level 1
recommendations and is not a standalone profile. The Profile Definitions section in the
benchmark provides the definitions as they pertain to the recommendations included for
the technology.
Description
Detailed information pertaining to the setting with which the recommendation is
concerned. In some cases, the description will include the recommended value.
Rationale Statement
Detailed reasoning for the recommendation to provide the user a clear and concise
understanding on the importance of the recommendation.
Page 9
Impact Statement
Any security, functionality, or operational consequences that can result from following
the recommendation.
Audit Procedure
Systematic instructions for determining if the target system complies with the
recommendation
Remediation Procedure
Systematic instructions for applying recommendations to the target system to bring it
into compliance according to the recommendation.
Default Value
Default value for the given setting in this recommendation, if known. If not known, either
not configured or not defined will be applied.
References
Additional documentation relative to the recommendation.
Additional Information
Supplementary information that does not correspond to any other field but may be
useful to the user.
Page 10
Profile Definitions
The following configuration profiles are defined by this Benchmark:
Items in this profile apply to end-user owned Apple iOS 15 and iPadOS 15
devices and intend to:
This profile extends the "Level 1 - End-User Owned Devices" profile. Items in this
profile apply to end-user owned Apple iOS 15 and iPadOS 15 devices and may:
Page 11
Acknowledgements
This Benchmark exemplifies the great things a community of users, vendors, and
subject matter experts can accomplish through consensus collaboration. The CIS
community thanks the entire consensus team with special recognition to the following
individuals who contributed greatly to the creation of this guide:
Contributor
Mike Wicks GCIH, GSEC, GSLC, GCFE, GISP
Jordan Rakoske GSEC, GCWN
Will Strafach
Philippe Langlois
Rael Daruszka , Center for Internet Security, New York
Hao Shu
Ron Colvin
Kari Byrd
Editor
Paul Campbell
Pierluigi Falcone CISSP, CISM, CRISC, GSTRT, CCSK, LA27001, SABSA Foundation
Edward Byrd
Page 12
Recommendations
1 Benchmark Guidance
Apple iOS 15 and iPadOS 15 provide operating system software to iPhone, iPod touch,
and iPad devices. Due to the near identical code base, use cases, threat scenarios, and
a shared configuration management mechanism, the CIS Community offers guidance
for both operating systems within this single benchmark.
For those unfamiliar with iOS and iPadOS device management, a Configuration Profile
(CP), which is an XML-formatted file, is the sole natively-supported mechanism for
enforcing controls. Whether you're an individual end-user or the administrator for an
enterprise deployment, you can create CPs for free using Apple Configurator or with
any text editor. Installation of a CP is as simple as connecting a device to the Apple
Configurator host via USB, opening the profile on any iOS or iPadOS device, pushing it
via macOS Server's Profile Manager, or deploying it via any modern Mobile Device
Management (MDM) console.
This benchmark release continues to separate guidance for end-user and institutionally-
owned devices. The intention is to scope security control appropriateness by ownership
model. This allows the benchmark to address the differing use cases and threat profiles,
as well as for an organization to maintain CIS compliance while allowing Bring Your
Own Device (BYOD). Look to individual recommendations for specific explanations on
the implementation chosen.
In order to support a subset of CP controls, supervision is required to be enabled on all
institutionally-owned devices. Supervision is a specific technical state of an iOS or
iPadOS device. It does not refer to management via CP or MDM console. It can be
enabled through Apple's Device Enrollment Program (DEP) in combination with an
MDM, or on a per-device basis using Apple Configurator. For more information, see
Supervise devices with Apple Configurator 2 for a general overview.
The Additional Recommendations section includes material for both ownership models.
Audits, and in some cases remediation, for these recommendations are available with
certain MDM solutions.
Thank you for taking the time to read this benchmark guidance.
The CIS iOS and iPadOS Community
Page 13
2 Configuration Profile Recommendations for End User-
Owned Devices
This section provides both level 1 and level 2 recommendations for devices in an
unsupervised state. The term "unsupervised" is a specific technical designation
regarding the state of an iOS or iPadOS device and does not mean the device is
unmanaged. See the introduction of this benchmark for clarification on the states
supervised and unsupervised.
The CIS iOS and iPadOS Community further recommends the use of Apple's Volume
Purchase Program (VPP) with end user-owned devices. The VPP allows an institution
to more effectively manage application licensing by maintaining full ownership and
control over applications deployed to end user devices, provided they are managed with
an MDM solution.
For more information on the VPP Apple program, visit: Apple Deployment Programs
VPP Guide
Page 14
2.1 General
Page 15
2.1.1 (L1) Ensure a "Consent Message" has been "Configured"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to the configuration of a consent message shown at the
time of a configuration profile installation.
Rationale:
In this section of the benchmark, recommendations are for devices that are owned by
the end user. They are voluntarily accepting the configuration profile and should be
provided an explicit opportunity to consent.
Audit:
From the Configuration Profile:
Page 16
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 17
2.1.2 (L1) Ensure "Controls when the profile can be removed" is
set to "Always" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the removal of a given configuration profile.
Rationale:
In this section of the benchmark, recommendations are for devices that are owned by
the end user. They are voluntarily accepting the configuration profile and should be able
to remove it at will.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Verify Remove Profile is displayed near the bottom of the screen.
Remediation:
Page 18
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 19
2.2 Restrictions
Page 20
2.2.1 Functionality
Page 21
2.2.1.1 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to initiating phone calls while a device is locked. Voice
dialing is handled separately from Siri.
Rationale:
Allowing calls from a locked device may allow for the impersonation of the device
owner.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Voice dialing while locked not allowed is displayed.
Remediation:
Page 22
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 23
2.2.1.2 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to accessing Siri while the device is locked.
Rationale:
Accessing Siri on a locked device may allow unauthorized users to access information
otherwise not available to them, such as messaging, contacts, and a variety of other
data.
Impact:
The end user must unlock the device before interacting with Siri.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Siri while locked not allowed is displayed.
Remediation:
Page 24
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 25
2.2.1.3 (L1) Ensure "Allow managed apps to store data in iCloud"
is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to managed applications storing and syncing data
through iCloud.
Rationale:
This recommendation addresses data leakage. It prevents a user from installing an
application that is managed by the organization on a personal device and allowing
iCloud to sync the managed application's data to the personal, non-managed
application.
Impact:
Syncing managed application data between multiple managed devices will not be
possible.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Managed apps cloud sync not allowed is displayed.
Page 26
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 27
2.2.1.4 (L1) Ensure "Force encrypted backups" is set to "Enabled"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to iTunes backup encryption of iOS and iPadOS devices.
Rationale:
Data that are stored securely on an iOS or iPadOS device may be trivially accessed
from a local computer backup. Forcing the encryption of backups protects data from
being compromised if the local host computer is compromised.
Impact:
End users must configure a password for the encrypted backup, the complexity of which
is not managed.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Encrypted backups enforced is displayed.
Page 28
Remediation:
Additional Information:
This function does not apply to iCloud backups. iCloud backups are encrypted in transit
and at rest by Apple.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 29
2.2.1.5 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled" (Manual)
Profile Applicability:
Description:
Apple provides a framework that allows advertisers to target Apple users with
advertisements relevant to them and their interests by means of a unique identifier. For
such personalized advertisements to be delivered, however, detailed information is
collected, correlated, and made available to advertisers. This information is valuable to
both advertisers and attackers and has been used with other metadata to reveal users'
identities.
Rationale:
Disabling the use of a unique identifier helps hinder the tracking of users, which in turn
supports protection of user data.
Impact:
Users will see generic advertising rather than targeted advertising. Apple warns that this
will reduce the number of relevant ads.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Apple personalized advertising not allowed is displayed.
Page 30
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 31
2.2.1.6 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the acceptance of untrusted TLS certificates.
Rationale:
iOS devices maintain a list of trusted TLS certificate roots. An organization may add
their own certificates to the list by using a configuration profile. Allowing users to bypass
that list and accept self-signed or otherwise unverified certificates may increase the
likelihood of an incident.
Impact:
The device automatically rejects untrusted HTTPS certificates without prompting the
user. Services using self-signed certificates will not function.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Establishing untrusted TLS connections not allowed is displayed.
Page 32
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 33
2.2.1.7 (L1) Ensure "Force automatic date and time" is set to
"Enabled" (Manual)
Profile Applicability:
Description:
It is possible to automatically set the date and time on devices running iOS 12 and later.
The time zone updates only when the device can determine its location, such as when a
device has a cellular connection or a Wi-Fi connection with location services enabled.
Rationale:
Correct date and time settings are required for authentication protocols, file creation,
modification dates, and log entries.
Impact:
When this option is enabled, users can’t turn off Set Automatically under General >
Date & Time
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Automatic date & time enforced is displayed.
Page 34
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 35
2.2.1.8 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to Apple's managed application implementation.
The terms "managed" and "unmanaged" refer to application classifications made
through Managed Open In, a feature introduced in iOS 7. Managed Open In provides
for data containerization. Institutionally-provisioned applications are designated as
managed. Applications elected by the end user are designated as unmanaged.
Rationale:
Limiting data transfer from the managed institutional application space to the
unmanaged user space may prevent data leakage.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Opening documents from managed to unmanaged apps not allowed is
displayed.
Page 36
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 37
2.2.1.9 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to Apple's managed application implementation.
The terms "managed" and "unmanaged" refer to application classifications made
through Managed Open In, a feature introduced in iOS 7. Managed Open In provides
for data containerization. Institutionally-provisioned applications are designated as
managed. Applications elected by the end user are designated as unmanaged.
Rationale:
Limiting data transfer from the unmanaged user application space to the managed
institutional space limits institutional resources from being employed for personal use.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Opening documents from unmanaged to managed apps not allowed is
displayed.
Page 38
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 39
2.2.1.10 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to AirDrop in the context of Apple's managed app
implementation.
The terms "managed" and "unmanaged" refer to application classifications made
through Managed Open In, a feature introduced in iOS 7. Managed Open In provides
for data containerization. Institutionally-provisioned applications are designated as
managed. Applications elected by the end user are designated as unmanaged.
Rationale:
When AirDrop is allowed as a managed destination, sensitive data may be moved out of
the managed application space to an unmanaged device.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Sharing managed documents using AirDrop not allowed is displayed.
Page 40
Remediation:
Additional Information:
Note that the feature specifically mentions destination and not source. Following this
recommendation does not prevent AirDrop connections into the managed application
space, only AirDrop connections out of the managed application space.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 41
2.2.1.11 (L2) Ensure "Allow Handoff" is set to "Disabled"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to Apple's Handoff data-sharing mechanism.
Rationale:
Handoff does not enforce managed application boundaries. This allows managed
application data to be moved to the unmanaged application space on another device,
which may result in data leakage.
Impact:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Handoff not allowed is displayed.
Remediation:
Page 42
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 43
2.2.1.12 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled" (Manual)
Profile Applicability:
Description:
Apple provides a mechanism to send diagnostic and analytics data back to them in
order help improve the platform. This information sent to Apple may contain internal
organizational information that should not be disclosed to third parties.
Rationale:
Organizations should have knowledge of what is shared with vendors and other third
parties, and should also be in full control of what is disclosed.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Diagnostic submission not allowed is displayed.
Page 44
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 45
2.2.1.13 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to configuring wrist detection on paired Apple Watches.
Rationale:
Wrist detection prevents a removed Apple Watch from providing access to information
not otherwise available.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Wrist detection enforced on Apple Watch is displayed.
Remediation:
Page 46
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 47
2.2.1.14 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the display of Control Center on the lock screen.
Rationale:
When a device is lost or stolen, the Control Center may be used to enable airplane
mode, thus preventing locating or erasing the device. Disabling Control Center forces a
malicious actor to power down the device, which then discards the encryption key in
memory. This makes some attacks based on physical possession more difficult.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Control Center on lock screen not allowed is displayed
Remediation:
Page 48
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 49
2.2.1.15 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the display of Notification Center on the lock screen.
Rationale:
Communications between the operating system and applications to a user should be
controlled to prevent data leakage or exploitation. For example, some two-factor
authentication applications will present the option to allow a login from a new device in
notification center on the lock screen.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Notifications view on lock screen not allowed is displayed.
Remediation:
Page 50
Additional Information:
The per-application notification settings described later in the benchmark can be used in
lieu of disabling Notification Center at the lock screen. This should only be done if there
is confidence that all applications producing sensitive notifications can be managed.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 51
2.2.2 Applications
Page 52
2.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to the Safari feature which warns end users about
visiting suspected fraudulent websites.
Rationale:
Fraudulent websites masquerade as legitimate instances of financial, business, or other
sensitive sites. They are designed to capture user credentials, often through phishing
campaigns. Safari's fraudulent website warning feature helps protect end users from
such sites.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Safari fraud warning enforced is displayed.
Remediation:
Page 53
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 54
2.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the automatic acceptance of third-party cookies.
Rationale:
Accepting cookies may allow web servers to interact with other cookies already in place.
For example, the HEIST cookie exploit allows for retrieving data from cookies stored on
a device. Cookies often follow poor coding practices and include authentication
properties. Limiting acceptance of cookies to only those from sites intentionally visited
reduces the likelihood of a potential exploit.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Cookie policy enforced is displayed.
Remediation:
Page 55
Additional Information:
From websites I visit accepts cookies from the current domain and any domain
you've visited. From current website only only accepts cookies from the current
domain.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 56
2.3 Domains
Page 57
2.3.1 (L1) Ensure "Managed Safari Web Domains" is "Configured"
(Manual)
Profile Applicability:
Description:
This recommendation pertains to whether Safari, as well as Mobile Device Management
(MDM) deployed browsers, will consider certain URL patterns for managed application
spaces only.
Rationale:
Sensitive files available from a website may be downloaded into the unmanaged
application spaces by default. By configuring specific domains that Safari should
consider managed, an institution may support the secure containerization of their data.
Audit:
From the Configuration Profile:
Remediation:
From the Configuration Profile:
Additional Information:
For improved effectiveness, this recommendation should be paired with the blacklisting
of web browsers not deployed through the MDM.
Page 58
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 59
2.4 Passcode
Page 60
2.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to passcode requirements. A simple passcode is defined
as containing repeated characters, or increasing/decreasing characters (such as 123 or
CBA).
Rationale:
Simple passcodes include repeating, ascending, or descending character sequences
that may be easily guessed.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Simple passcodes allowed displays No.
Remediation:
Page 61
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 62
2.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled" (Manual)
Profile Applicability:
Description:
Passwords set by users must contain at least one letter and one number.
Rationale:
Complex passwords are more resistant against persons seeking unauthorized access to
a system.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Require alphanumeric value displays Yes.
Remediation:
Page 63
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 64
2.4.3 (L1) Ensure "Minimum passcode length" is set to a value of
"6" or greater (Automated)
Profile Applicability:
Description:
This recommendation pertains to minimum passcode length.
Rationale:
Requiring at least six character minimum length provides reasonable assurance against
passcode attacks.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Minimum length displays 6, or greater.
Remediation:
Page 65
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 66
2.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes" or
less (Automated)
Profile Applicability:
Description:
This recommendation pertains to the maximum number of minutes a device may remain
inactive before auto-locking.
Note: This recommendation refers to maximum auto-lock, consistent with the interface
language, but iOS and iPadOS devices treat the auto-lock function as equaling exactly
2 minutes.
Rationale:
Automatically locking the device after a short period of inactivity reduces the probability
of an attacker accessing the device without entering a passcode.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Max inactivity displays 2 minutes.
Remediation:
Page 67
Additional Information:
This is not enforced during certain activities; such as watching movies.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 68
2.4.5 (L1) Ensure "Maximum grace period for device lock" is set
to "Immediately" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the amount of time a device may be unlocked without
entering a passcode after that device has been locked. Devices with TouchID enabled
do not allow a grace period.
Rationale:
Configuring the Maximum grace period for device lock to Immediately precludes
unauthenticated access when waking the device.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Max grace period displays Immediately.
Remediation:
Page 69
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 70
2.4.6 (L1) Ensure "Maximum number of failed attempts" is set to
"6" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the number of attempted logins before automatic
deletion of a device's cryptographic key.
Rationale:
Excessive incorrect passcode attempts typically indicate that the owner has lost
physical control of the device. In the event of such an incident, erasing the encryption
key will help to ensure confidentiality of information stored on the device.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Max failed attempts displays 6.
Remediation:
Page 71
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 72
2.5 Wi-Fi
Page 73
2.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured" (Manual)
Profile Applicability:
Description:
This recommendation pertains to disabling MAC randomization as needed.
Rationale:
1. Tap Settings.
2. Tap Wi-Fi.
3. Tap the relevant network.
4. Ensure Private Addressis disabled.
Page 74
Remediation:
This remediation procedure cannot be accomplished with a checkbox, it needs to be
applied on a per-network basis as appropriate.
From the Configuration Profile:
1. Tap Settings.
2. Tap Wi-Fi.
3. Tap the relevant network.
4. Disable the option Private Address.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 75
2.6 VPN
Page 76
2.6.1 (L1) Ensure "VPN" is "Configured" (Manual)
Profile Applicability:
Description:
This recommendation pertains to establishing a virtual private network (VPN)
connection when appropriate.
Rationale:
The network to which a device connects provides important services that may be
exploited by a malicious actor. Establishing a VPN mitigates the associated risks by
encrypting data in transit and using known good network services, such as DNS.
Audit:
This audit procedure cannot be accomplished with a checkbox verification. As
mentioned below, a per-application VPN configuration is the preferred solution, but a
system-wide VPN is also acceptable. The auditor will need to determine which solution,
and to what extent in the per-application VPN case, is appropriate.
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN.
4. Inspect the configuration.
Page 77
Remediation:
This remediation procedure cannot be accomplished with a checkbox. As mentioned
below, a per-application VPN configuration is the preferred option, but a system-wide
VPN is also acceptable. An appropriate solution will need to be determined and
implemented.
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN.
4. Enter an appropriate VPN configuration.
References:
1. https://developer.apple.com/library/content/featuredarticles/iPhoneConfigurationP
rofileRef/Introduction/Introduction.html#//apple_ref/doc/uid/TP40010206-CH1-
SW37
Additional Information:
iOS and iPadOS support both per-application VPN and system-wide VPN. Per-
application configuration is preferred because it is always on, managed entirely through
the configuration profile and/or Mobile Device Management (MDM), and invisible to the
end-user.
CIS Benchmarks do not recommend specific VPN settings, as these depend on each
organization capability, however it strongly suggests industry or governmental guidance
to be followed.
References:
• https://media.defense.gov/2021/Sep/28/2002863184/-1/-1/0/CSI_SELECTING-
HARDENING-REMOTE-ACCESS-VPNS-20210928.PDF
• https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-
the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-
to-Cybersecurity-Incidents.pdf
• https://support.apple.com/en-ca/guide/deployment-reference-
ios/ior9f7b5ff26/web
Page 78
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 79
2.7 Mail
Page 80
2.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to whether a message can be moved from an
institutionally-configured mail account to an end user-configured mail account. It also
limits forwarding or replying from a different account than the one from which the
message originated.
Note: This recommendation only applies if an institutionally-configured mail account
resides on the device.
Rationale:
Allowing the movement of messages from a managed email account to an unmanaged
email account may result in data leakage.
Audit:
From the Configuration Profile:
Default Value:
Message movement, forwarding, and replying are unrestricted.
Page 81
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 82
2.7.2 (L2) Ensure "Allow Mail Drop" is set to "Disabled"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to whether a message attachment can be uploaded or
accessed through Apple's Mail Drop service.
Note: This recommendation only applies if an institutionally-configured mail account
resides on the iOS device.
Rationale:
Permitting attachment uploads to Mail Drop, which is outside organizational control,
presents a data exfiltration path.
Audit:
From the Configuration Profile:
Page 83
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 84
2.8 Notifications
Page 85
2.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps" (Manual)
Profile Applicability:
Description:
This recommendation pertains to the configuration of notification settings on a per-
application basis.
Rationale:
Notifications may include sensitive data or might allow for privileged actions to take
place. All managed applications must include explicit notification settings in order to
address these concerns.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap Notifications.
3. Verify that managed apps are grayed out to indicate that their notification settings
are managed.
Remediation:
Page 86
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 87
3 Configuration Profile Recommendations for Institutionally-
Owned Devices
This section provides both level 1 and level 2 recommendations for devices in a
supervised state. The term “supervised” is a specific technical designation in regards to
the state of an iOS or iPadOS device and is generally only applied to institutionally-
owned devices. See the introduction of this benchmark for clarification on the states
supervised and unsupervised.
The CIS iOS and iPadOS Community further recommends the use of Apple's Device
Enrollment Program (DEP) and Volume Purchase Program (VPP) with institutionally-
owned devices. The DEP associates devices owned by an institution with its MDM
server(s). The association occurs during setup when the iOS or iPadOS device contacts
an Apple activation server. This ensures that all devices owned by an institution are
being managed by its MDM solution, and allows for the distribution of iOS or iPadOS
devices brand new or restored to factory default because they will receive configuration
at activation. The VPP allows an institution to more effectively manage app licensing by
maintaining full ownership and control over apps deployed within the organization. This
can be especially useful for shared devices where managing AppleID app ownership is
impractical.
For more information on these two Apple programs, visit:
https://help.apple.com/deployment/business/
Page 88
3.1 General
Page 89
3.1.1 (L1) Ensure "Controls when the profile can be removed" is
set to "Never" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the removal of a given configuration profile.
Rationale:
In this section of the benchmark, recommendations are for devices that are owned by
the institution. Removal of the configuration profile should be at the discretion of the
institution, not the end user, in order to prevent weakening the device's security and
exposing its data.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Verify Remove Profile is not displayed near the bottom of the screen.
Remediation:
Page 90
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 91
3.2 Restrictions
Page 92
3.2.1 Functionality
Page 93
3.2.1.1 (L2) Ensure "Allow screenshots and screen recording" is
set to "Disabled" (Manual)
Profile Applicability:
Description:
This recommendation pertains to limiting screenshots and screen recordings.
Rationale:
Sensitive information may be displayed through a managed application that could be
captured by screenshot or screen recording into the unmanaged space inadvertently or
intentionally by a malicious insider.
Impact:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Screen capture and recording not allowed is displayed.
Remediation:
Page 94
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 95
3.2.1.2 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to initiating phone calls while a device is locked. Voice
dialing is handled separately from Siri.
Rationale:
Allowing calls from a locked device may allow for the impersonation of the device
owner.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Voice dialing while locked not allowed is displayed.
Remediation:
Page 96
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 97
3.2.1.3 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to access to Siri while the device is locked.
Rationale:
Accessing Siri on a locked device may allow unauthorized users to access information
otherwise not available to them, such as messaging, contacts, and a variety of other
data.
Impact:
The end user must unlock the device before interacting with Siri.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Siri while locked not allowed is displayed.
Remediation:
Page 98
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 99
3.2.1.4 (L1) Ensure "Allow iCloud backup" is set to "Disabled"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to allowing iCloud backup.
Rationale:
iCloud backups are encrypted in transit and at rest within Apple's infrastructure, but
there is no protection against restoring a backup to an unmanaged device. This
potentially allows for data leakage.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm iCloud backup not allowed is displayed.
Remediation:
Page 100
Additional Information:
This recommendation is exclusively for institutionally-owned devices. If an institution is
relying on Bring Your Own Device (BYOD), those devices should not contain sensitive
material necessary to protect at this level.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 101
3.2.1.5 (L1) Ensure "Allow iCloud documents & data" is set to
"Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the storage and syncing of data through iCloud from
institutionally-owned devices.
Rationale:
Institutionally-owned devices are often connected to personal iCloud accounts. This is
expected and normal. The data from institutionally-owned devices, however, should not
co-mingle with the end-user's personal data. This creates a potential avenue for data
leakage.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Documents in the Cloud not allowed is displayed.
Remediation:
Page 102
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 103
3.2.1.6 (L1) Review "Allow iCloud Keychain" settings (Automated)
Profile Applicability:
Description:
iCloud Keychain allows passwords associated with an Apple ID to be available for
unencrypted use to the authenticated user for the Apple account. Organizations should
review whether enterprise accounts might be stored unauthorized in Apple's personal
cloud.
Rationale:
It is normal and expected for end users to configure their personal iCloud account on an
institutionally-owned device. Because of this, disabling iCloud Keychain prevents OS-
automated credential transfer to devices outside organizational control, thus reducing
the risk for misuse of those credentials from unauthorized devices.
Impact:
Several risk aspects should be reviewed prior to disabling iCloud Keychain:
Page 104
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm iCloud Keychain not allowed is displayed.
Remediation:
Additional Information:
This recommendation is not intended as advice against using the Keychain locally on an
institutionally-owned device, nor is it intended to be taken as a recommendation to
prevent iCloud Keychain from being used on end user-owned devices.
Page 105
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 106
3.2.1.7 (L1) Ensure "Allow managed apps to store data in iCloud"
is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to managed applications storing and syncing data
through iCloud.
Rationale:
This recommendation addresses data leakage. It prevents a user from installing an
application that is managed by the organization on a personal device and allowing
iCloud to sync the managed application's data to the personal, non-managed
application.
Impact:
Data created on the device may be lost if the end user has not transferred it to another
device.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Managed apps cloud sync not allowed is displayed.
Page 107
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 108
3.2.1.8 (L2) Ensure "Allow USB drive access in Files app" is set to
"Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to preventing the Files app from accessing USB media.
Rationale:
The Files app provides a local file system and interface to USB media for iOS and
iPadOS devices. In environments with sensitive data and strict data loss prevention
policies, disabling the use of USB media with such devices may reduce the risk of data
leakage.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm USB drives not accessible in Files app is displayed.
Remediation:
Page 109
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 110
3.2.1.9 (L2) Ensure "Allow network drive access in Files app" is
set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to preventing the Files app from accessing networking
file shares.
Rationale:
The Files app provides a local file system and interface to network file shares for iOS
and iPadOS devices. In environments with sensitive data and strict data loss prevention
policies, disabling the use of network file shares with such devices may reduce the risk
of data leakage.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Network drives not accessible in Files app is displayed.
Remediation:
Page 111
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 112
3.2.1.10 (L1) Ensure "Force encrypted backups" is set to
"Enabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to iTunes backup encryption of iOS and iPadOS devices.
Rationale:
Data that are stored securely on an iOS or iPadOS device may be trivially accessed
from a local computer. Forcing the encryption of backups significantly reduces the
likelihood of sensitive data being compromised if the local host computer is
compromised.
Impact:
End users must configure a password for the encrypted backup, the complexity of which
is not managed.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Encrypted backups enforced is displayed.
Page 113
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 114
3.2.1.11 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled" (Manual)
Profile Applicability:
Description:
Apple provides a framework that allows advertisers to target Apple users with
advertisements relevant to them and their interests by means of a unique identifier. For
such personalized advertisements to be delivered, however, detailed information is
collected, correlated, and made available to advertisers. This information is valuable to
both advertisers and attackers and has been used with other metadata to reveal users'
identities.
Rationale:
Disabling the use of a unique identifier helps hinder the tracking of users, which in turn
supports protection of user data.
Impact:
Users will see generic advertising rather than targeted advertising. Apple warns that this
will reduce the number of relevant ads.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Apple personalized advertising not allowed is displayed.
Page 115
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 116
3.2.1.12 (L1) Ensure "Allow Erase All Content and Settings" is set
to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the factory reset functionality of iOS and iPadOS
devices.
Rationale:
An institutionally-owned device should not allow an end user to destroy data.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Erase content and settings not allowed is displayed.
Remediation:
Page 117
Additional Information:
An end-user may still employ Apple's Find My iPhone/iPad service to perform an Erase
All Content and Settings. This also sets an activation lock on the device. Activation lock
may be blocked using a Mobile Device Management (MDM) solution, but not via
configuration profile.
For more information, see https://support.apple.com/en-us/HT202804
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 118
3.2.1.13 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the acceptance of untrusted TLS certificates.
Rationale:
iOS devices maintain a list of trusted TLS certificate roots. An organization may add
their own certificates to the list by using a configuration profile. Allowing users to bypass
that list and accept self-signed or otherwise unverified certificates may increase the
likelihood of an incident.
Impact:
The device automatically rejects untrusted HTTPS certificates without prompting the
user.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Establishing untrusted TLS connections not allowed is displayed.
Page 119
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 120
3.2.1.14 (L1) Ensure "Allow trusting new enterprise app authors"
is set to "Disabled" (Manual)
Profile Applicability:
Description:
This recommendation pertains to permitting application installation by end users from
outside the Apple App Store or Mobile Device Management (MDM) deployment.
Rationale:
Allowing application installation by end users from outside of the Apple App Store or
Mobile Device Management (MDM) may permit a user to install a malicious application.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Allow trusting new enterprise app authors not allowed is
displayed.
Remediation:
Page 121
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 122
3.2.1.15 (L1) Ensure "Allow installing configuration profiles" is set
to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the installation of additional configuration profiles.
Rationale:
This recommendation allows an institution to ensure that only the configuration profiles
they provide are loaded onto the device.
Impact:
Some services, such as WiFi hotspot networks, may be prevented from working by
blocking their configuration profiles.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Installing configuration profiles not allowed is displayed.
Remediation:
Page 123
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 124
3.2.1.16 (L1) Ensure "Allow adding VPN configurations" is set to
"Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the addition of user-defined VPN configurations.
Rationale:
This recommendation allows an institution to ensure that only the VPN configurations
they provide are loaded onto the device.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm VPN creation not allowed is displayed.
Remediation:
Page 125
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 126
3.2.1.17 (L1) Ensure "Force automatic date and time" is set to
"Enabled" (Manual)
Profile Applicability:
Description:
It is possible to automatically set the date and time on devices running iOS 12 and later.
The time zone updates only when the device can determine its location, such as when a
device has a cellular connection or a Wi-Fi connection with location services enabled.
Rationale:
Correct date and time settings are required for authentication protocols, file creation,
modification dates, and log entries.
Impact:
When this option is enabled, users can’t turn off Set Automatically under General >
Date & Time
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Automatic date & time enforced is displayed.
Page 127
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 128
3.2.1.18 (L2) Ensure "Allow modifying cellular data app settings"
is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to modifying the use of cellular data by applications.
Rationale:
It is appropriate for an institution to have remote locating and erasure capability with
their devices. Forcing cellular data to remain active supports that functionality.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Changing app cellular data usage not allowed is displayed.
Remediation:
Page 129
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 130
3.2.1.19 (L1) Ensure "Allow USB accessories while the device is
locked" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to allowing USB devices communicate with a locked
device.
Rationale:
Physical attacks against iOS and iPadOS devices have been developed that exploit the
trust of physically-connected accessories. This has led to proof-of-concept data
extraction and even commercially available hardware designed to perform such attacks.
By requiring the device to be unlocked in order to remove data, this control reduces the
probability of a successful data extraction.
Impact:
An end user will not be able to connect their device to a USB accessory while the
device is locked.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm USB accessories while locked allowed is NOT displayed.
Page 131
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 132
3.2.1.20 (L2) Ensure "Allow pairing with non-Configurator hosts"
is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to allowing data communication with a host computer.
Rationale:
Host pairing is a process by which an iOS or iPadOS device creates a cryptographically
verified connection with a trusted host computer. By disabling the addition of new host
pairings, a variety of hardware-based attacks on the device are blocked.
Impact:
An end user will not be able to sync media to and from the device.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Pairing with iTunes not allowed is displayed.
Remediation:
Page 133
Additional Information:
There are two important pieces of data on the Apple Configurator host. The login
keychain will include the host's identity certificate and may be exported. The escrow
keybags related to each device will be found in /var/db/lockdown. It is important that
both these be backed up for continuity of device management. They may also be
duplicated to other Macs to allow management of the configured devices.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 134
3.2.1.21 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to Apple's managed application implementation.
The terms "managed" and "unmanaged" refer to app classifications made through
Managed Open In, a feature introduced in iOS 7. Managed Open In provides for data
containerization. Institutionally-provisioned apps are designated managed. Apps elected
by the end user are designated unmanaged.
Rationale:
Limiting data transfer from the managed institutional application space to the user space
may prevent data leakage.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Opening documents from managed to unmanaged apps not allowed is
displayed.
Page 135
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 136
3.2.1.22 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to Apple's managed application implementation.
The terms "managed" and "unmanaged" refer to application classifications made
through Managed Open In, a feature introduced in iOS 7. Managed Open In provides
for data containerization. Institutionally-provisioned applications are designated as
managed. Applications elected by the end user are designated as unmanaged.
Rationale:
Limiting data transfer from the unmanaged user application space to the managed
institutional space limits institutional resources from being employed for personal use.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Opening documents from unmanaged to managed apps not allowed is
displayed.
Page 137
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 138
3.2.1.23 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to AirDrop in the context of Apple's managed app
implementation.
The terms "managed" and "unmanaged" refer to application classifications made
through Managed Open In, a feature introduced in iOS 7. Managed Open In provides
for data containerization. Institutionally-provisioned applications are designated as
managed. Applications elected by the end user are designated as unmanaged.
Rationale:
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Sharing managed documents using AirDrop not allowed is displayed.
Remediation:
Page 139
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 140
3.2.1.24 (L1) Ensure "Allow Handoff" is set to "Disabled"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to Apple's Handoff data-sharing mechanism.
Rationale:
Handoff does not enforce managed application boundaries. This allows managed
application data to be moved to the unmanaged application space on another device,
which may result in data leakage.
Impact:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Handoff not allowed is displayed.
Remediation:
Page 141
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 142
3.2.1.25 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled" (Manual)
Profile Applicability:
Description:
Apple provides a mechanism to send diagnostic and analytics data back to them in
order help improve the platform. This information sent to Apple may contain internal
organizational information that should not be disclosed to third parties.
Rationale:
Organizations should have knowledge of what is shared with vendors and other third
parties, and should also be in full control of what is disclosed.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Diagnostic submission not allowed is displayed.
Page 143
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 144
3.2.1.26 (L1) Ensure "Require Touch ID / Face ID authentication
before AutoFill" is set to "Enabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to forcing re-authentication at each AutoFill operation.
Rationale:
A device may be accessed by an unauthorized user while unlocked. This
recommendation provides defense-in-depth by forcing re-authentication before
credentials will be populated by AutoFill.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Authentication before Auto Filling passwords enforced is displayed
Remediation:
Page 145
Additional Information:
The benchmark remains intentionally silent on permitting the use of the local Apple
Keychain, deferring to each institution to consider its own circumstances and associated
risk.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 146
3.2.1.27 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to configuring wrist detection on paired Apple Watches.
Rationale:
Wrist detection prevents a removed Apple Watch from providing access to information
not otherwise available.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Wrist detection enforced on Apple Watch is displayed
Remediation:
Page 147
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 148
3.2.1.28 (L1) Ensure "Allow setting up new nearby devices" is set
to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to Apple's Quick Start setup feature.
Rationale:
This recommendation prevents an institutionally-owned device from transferring
configurations or content to another device.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Proximity Setup to a new device is not allowed is displayed.
Remediation:
Additional Information:
For more information on Quick Start, see: https://support.apple.com/en-us/HT201269
Page 149
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 150
3.2.1.29 (L1) Ensure "Allow proximity based password sharing
requests" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to preventing proximity-based password sharing from
institutionally-owned devices.
Rationale:
In an organizational context, access to systems and applications should be provisioned
by role, with credentials only being transferred through supported credential
management systems. Additionally, credential sharing requests may be exploited
through a social engineering scheme.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Proximity password requests not allowed is displayed.
Remediation:
Page 151
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 152
3.2.1.30 (L1) Ensure "Allow password sharing (supervised only)"
is set to "Disabled" (Manual)
Profile Applicability:
Description:
This recommendation pertains to sharing credentials between devices, such as through
AirDrop.
Rationale:
Allowing password sharing may increase the likelihood of an institutionally related
credential being moved to a non-institutionally controlled device.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Restrictions.
7. Confirm Password sharing is not allowed is displayed.
Remediation:
Page 153
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 154
3.2.1.31 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the display of Control Center on the lock screen.
Rationale:
When a device is lost or stolen, the Control Center may be used to enable airplane
mode, thus preventing locating or erasing the device. It forces a malicious actor to
power down the device, which then discards the encryption key in memory. This makes
other attacks based on physical possession more difficult.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Control Center view on lock screen not allowed is displayed
Remediation:
Page 155
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 156
3.2.1.32 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the display of Notification Center on the lock screen.
Rationale:
Communications between the operating system and applications to a user should be
controlled to prevent data leakage or exploitation. For example, some two-factor
authentication applications will present the option to allow a login from a new device in
notification center on the lock screen.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Notifications view on lock screen not allowed is displayed
Remediation:
Page 157
Additional Information:
The per-application notification settings described later in the benchmark can be used in
lieu of disabling Notification Center at the lock screen. This should only be done if there
is confidence that all applications producing sensitive notifications can be managed.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 158
3.2.2 Apps
Page 159
3.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to the Safari feature which warns end users about
visiting suspected fraudulent websites.
Rationale:
Enabling a warning may help users avoid accidentally visiting known phishing or other
fraudulent sites covered by this feature.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Safari fraud warning enforced is displayed.
Remediation:
Page 160
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 161
3.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the acceptance of third-party cookies.
Rationale:
The HEIST cookie exploit allows for retrieving data from cookies stored on a device.
Cookies often follow poor coding practices and often include authentication properties.
Limiting acceptance of cookies to only those from sites intentionally visited reduces the
likelihood of exploitation.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Confirm Cookie policy enforced is displayed.
Remediation:
Page 162
Additional Information:
From websites I visit accepts cookies from the current domain and any other domain
you've visited. From current website only only accepts cookies from the current
domain.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 163
3.3 Domains
Page 164
3.3.1 (L1) Ensure "Managed Safari Web Domains" is "Configured"
(Manual)
Profile Applicability:
Description:
This recommendation pertains to whether Safari, as well as Mobile Device Management
(MDM) deployed browsers, will consider certain URL patterns for managed application
spaces only.
Rationale:
Sensitive files available from a website may be downloaded into the unmanaged
application spaces by default. By configuring specific domains that Safari should
consider managed, an institution may support the secure containerization of their data.
Audit:
From the Configuration Profile:
Remediation:
From the Configuration Profile:
Additional Information:
For improved effectiveness, this recommendation should be paired with the blacklisting
of web browsers not deployed through the MDM.
Page 165
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 166
3.4 Passcode
Page 167
3.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
(Automated)
Profile Applicability:
Description:
This recommendation pertains to passcode requirements. A simple passcode is defined
as containing repeated characters, or increasing/decreasing characters (such as 123 or
CBA).
Rationale:
Simple passcodes such as those with repeating, ascending, or descending character
sequences are easily guessed. Preventing the selection of passwords containing such
sequences increases the complexity of the passcode and reduces the ease with which
an attacker may attempt to guess the passcode in order to gain access to the device.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Simple passcodes allowed displays No.
Remediation:
Page 168
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 169
3.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled" (Manual)
Profile Applicability:
Description:
Passwords set by users must contain at least one letter and one number.
Rationale:
Complex passwords are more resistant against persons seeking unauthorized access to
a system.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Require alphanumeric value displays Yes.
Remediation:
Page 170
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 171
3.4.3 (L1) Ensure "Minimum passcode length" is set to a value of
"6" or greater (Automated)
Profile Applicability:
Description:
This recommendation pertains to minimum passcode length.
Rationale:
Requiring at least six character minimum length provides reasonable assurance against
passcode attacks.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Minimum length displays 6, or greater.
Remediation:
Page 172
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 173
3.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes" or
less (Automated)
Profile Applicability:
Description:
This recommendation pertains to the maximum number of minutes a device may remain
inactive before auto-locking.
Note: This recommendation refers to maximum auto-lock, consistent with the interface
language, but iOS and iPadOS devices treat the auto-lock function as equaling exactly
2 minutes.
Rationale:
Automatically locking the device after a short period of inactivity reduces the probability
of an attacker accessing the device without entering a password.
Impact:
This is not enforced during certain activities, such as watching movies.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Max inactivity displays 2 minutes.
Page 174
Remediation:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 175
3.4.5 (L1) Ensure "Maximum grace period for device lock" is set
to "Immediately" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the amount of time a device may be unlocked without
entering a passcode after that device has been locked. Devices with TouchID enabled
do not allow a grace period.
Rationale:
Configuring the Maximum grace period for device lock to Immediately precludes
unauthenticated access when waking the device.
Audit:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Max grace period displays Immediately.
Remediation:
Page 176
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 177
3.4.6 (L1) Ensure "Maximum number of failed attempts" is set to
"6" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the number of attempted logins before automatic
deletion of a device's cryptographic key.
Rationale:
Excessive incorrect passcode attempts typically indicate that the owner has lost
physical control of the device. In the event of such an incident, erasing the encryption
key will help to ensure confidentiality of information stored on the device.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN & Device Management.
4. Tap <_Profile Name_>.
5. Tap Restrictions.
6. Tap Passcode.
7. Confirm Max failed attempts is set to 6.
Remediation:
Page 178
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 179
3.5 Wi-Fi
Page 180
3.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured" (Manual)
Profile Applicability:
Description:
This recommendation pertains to disabling MAC randomization as needed.
Rationale:
1. Tap Settings.
2. Tap Wi-Fi.
3. Tap the relevant network.
4. Ensure Private Addressis disabled.
Page 181
Remediation:
This remediation procedure cannot be accomplished with a checkbox, it needs to be
applied on a per-network basis as appropriate.
From the Configuration Profile:
1. Tap Settings.
2. Tap Wi-Fi.
3. Tap the relevant network.
4. Disable the option Private Address.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 182
3.6 VPN
Page 183
3.6.1 (L1) Ensure "VPN" is "Configured" (Manual)
Profile Applicability:
Description:
This recommendation pertains to establishing a virtual private network (VPN)
connection as needed.
Rationale:
The network to which a device connects provides important services that may be
exploited by a malicious actor. Establishing a VPN mitigates the associated risks by
encrypting data in transit and using known good network services, such as DNS.
Audit:
This audit procedure cannot be accomplished with a checkbox verification. As
mentioned below, a per-application VPN configuration is the preferred solution, but a
system-wide VPN is also acceptable. The auditor will need to determine which solution
is appropriate, and to what extent on a per-application VPN case.
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN.
4. Inspect the configuration.
Page 184
Remediation:
This remediation procedure cannot be accomplished with a checkbox. As mentioned
below, a per-application VPN configuration is the preferred solution, but a system-wide
VPN is also acceptable. An appropriate solution will need to be determined and
implemented.
From the Configuration Profile:
1. Tap Settings.
2. Tap General.
3. Tap VPN.
4. Enter an appropriate VPN configuration.
References:
1. https://developer.apple.com/library/content/featuredarticles/iPhoneConfigurationP
rofileRef/Introduction/Introduction.html#//apple_ref/doc/uid/TP40010206-CH1-
SW37
2. https://developer.apple.com/library/content/featuredarticles/iPhoneConfigurationP
rofileRef/Introduction/Introduction.html#//apple_ref/doc/uid/TP40010206-CH1-
SW27
Page 185
Additional Information:
iOS 11 supports both per-application VPN and system-wide VPN. Per-application
configuration is preferred because it is always on, managed entirely through the
configuration profile and/or Mobile Device Management (MDM), and invisible to the end-
user.
CIS Benchmarks do not recommend specific VPN settings, as these depend on each
organization capability, however it strongly suggests industry or governmental guidance
to be followed.
References:
• https://media.defense.gov/2021/Sep/28/2002863184/-1/-1/0/CSI_SELECTING-
HARDENING-REMOTE-ACCESS-VPNS-20210928.PDF
• https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-
the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-
to-Cybersecurity-Incidents.pdf
• https://support.apple.com/en-ca/guide/deployment-reference-
ios/ior9f7b5ff26/web
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 186
3.7 Mail
Page 187
3.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to whether a message can be moved from an
institutionally-configured mail account to an end user-configured mail account. It also
limits forwarding or replying from a different account than the one from which the
message originated.
Note: This recommendation only applies if an institutionally-configured mail account
resides on the device.
Rationale:
Allowing the movement of messages from a managed email account to an unmanaged
email account may result in data leakage.
Audit:
From the Configuration Profile:
Page 188
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 189
3.7.2 (L2) Ensure 'Allow Mail Drop' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
This recommendation pertains to whether a message attachment can be uploaded and
accessed through Apple's Mail Drop service.
NOTE: This recommendation only applies if an institutionally configured mail
account resides on the iOS device.
Rationale:
Permitting attachment uploads to Mail Drop, which is outside organizational control,
presents a data exfiltration path.
Audit:
From the Configuration Profile:
Page 190
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 191
3.8 Notifications
Page 192
3.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the configuration of notification settings on a per-
application basis.
Rationale:
Notifications may include sensitive data or might allow for privileged actions to take
place. All managed applications must include explicit notification settings in order to
address these concerns.
Audit:
From the Configuration Profile:
1. Tap Settings.
2. Tap Notifications.
3. Verify that managed apps are grayed out to indicate that their notification settings
are managed.
Remediation:
Page 193
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 194
3.9 Lock Screen Message
Page 195
3.9.1 (L1) Ensure "If Lost, Return to..." Message is "Configured"
(Manual)
Profile Applicability:
Description:
This recommendation pertains to configuring a lock screen message.
Rationale:
A lock screen message will allow an honest bystander to more easily return a lost
device.
This message need not identify the owner by name, but should reference a phone
number or email address to contact (for example, the help desk of an organization).
Audit:
From the Configuration Profile:
Remediation:
Page 196
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 197
4 Additional Recommendations
This section provides both level 1 and level 2 recommendations for configuring iOS and
iPadOS devices. These recommendations are not configurable via a configuration
profile. They are accessible on the device either locally or through certain Mobile Device
Management (MDM) solutions.
Page 198
4.1 (L1) Ensure device is not obviously jailbroken (Automated)
Profile Applicability:
This recommendation pertains to inspecting a device for the presence of the most
common jailbreak indicator.
Rationale:
A jailbroken iOS device may execute arbitrary code, compromise configuration profile
requirements, or open the device to exploits that are otherwise not possible.
Audit:
Remediation:
Restore the iOS to a known good state from a trusted computer:
1. Open iTunes.
2. Connect the iOS device to the computer with a USB cable.
3. Select your iOS device within iTunes.
4. Select Restore iPhone/iPad.
5. After restoration, set up as a new device or restore from a known good backup.
Page 199
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 200
4.2 (L1) Ensure "Install iOS Updates" of "Automatic Updates" is
set to "Enabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the automatic installation of operating system updates.
Rationale:
System updates may patch software vulnerabilities, therefore it is important that devices
are kept up-to-date.
Impact:
In the following circumstances automatic updates should be kept disabled:
Audit:
From the device:
1. Tap Settings.
2. Tap General.
3. Tap Software Updates
4. Tap Automatic Updates.
5. Verify that Download iOS Updatess and Install iOS Updatess are enabled.
Remediation:
From the device:
1. Tap Settings.
2. Tap General.
3. Tap Software Updates
4. Tap Automatic Updates.
5. Enable Download iOS Updatess and Install iOS Updatess.
Page 201
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 202
4.3 (L1) Ensure "Software Update" returns "Your software is up to
date." (Automated)
Profile Applicability:
Description:
This recommendation pertains to updating and upgrading the operating system of a
given device.
Rationale:
An up-to-date operating system provides the best possible protection against the
execution of malicious code.
Audit:
From the device:
1. Tap Settings.
2. Tap General.
3. Tap Software Update.
4. Verify that iOS is up to date. is returned.
Remediation:
From the device:
1. Tap Settings.
2. Tap General.
3. Tap Software Update.
4. Tap Install or Download and Install and then allow device to complete the
installation.
Page 203
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 204
4.4 (L1) Review "iCloud Private Relay" settings (Manual)
Profile Applicability:
Page 205
Audit:
From the device:
1. Tap Settings.
2. Tap <_The User's Name_> where Apple ID, iCloud, iTunes & App Store is
displayed beneath.
3. Tap iCloud.
4. Tap Private Relay.
5. Verify that Private Relay is enabled.
Remediation:
From the device:
1. Tap Settings.
2. Tap <_The User's Name_> where Apple ID, iCloud, iTunes & App Store is
displayed beneath.
3. Tap iCloud.
4. Tap Private Relay.
5. Enable Private Relay.
References:
1. https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.
PDF
Page 206
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 207
4.5 (L1) Review "Mail Privacy Protection" settings (Manual)
Profile Applicability:
Mail Privacy Protection helps protect user privacy by preventing email senders from
learning information about the activity they engage with using the Mail application.
When turned on, this feature hides user IP addresses.
Rationale:
By enabling Mail Privacy, senders cannot build a profile of a user's online activity or
determine their location. Such a feature also prevents senders from seeing if users have
opened the email they sent.
Hiding user IP addresses prevents user tracking and profiling, which results in an
increased level of privacy while using the Mail app.
Impact:
Some entities or enterprises might be required to audit all network traffic by policy. In
this case, it is possible to block access to Mail Privacy Protection. The fastest and most
reliable way to do this is to return a negative answer from the network’s DNS resolver,
preventing DNS resolution for the mask.icloud.com and mask-h2.icloud.com hostnames
necessary for Mail Privacy Protection traffic.
In this scenario, users will still be able to use the service when they are not connected
to their corporate network.
Audit:
From the device:
1. Tap Settings.
2. Tap Mail.
3. Tap Privacy Protection.
4. Verify that Protect Mail Activity is enabled.
Page 208
Remediation:
From the device:
1. Tap Settings.
2. Tap Mail.
3. Tap Privacy Protection.
4. Enable Protect Mail Activity.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 209
4.6 (L1) Ensure "Automatic Downloads" of "App Updates" is set to
"Enabled" (Automated)
Profile Applicability:
Description:
This recommendation pertains to the automatic installation of application updates.
Rationale:
1. Tap Settings.
2. Tap App Store.
3. Verify that under AUTOMATIC DOWNLOADS, App Updates is enabled.
Remediation:
1. Tap Settings.
2. Tap iTunes & App Store.
3. Under AUTOMATIC DOWNLOADS, enable App Updates.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 210
4.7 (L1) Ensure "Find My iPhone/iPad" is set to "Enabled" on end
user-owned devices (Automated)
Profile Applicability:
Description:
This recommendation pertains to remote device locating, locking, and erasure by the
end user.
Rationale:
The ability to locate, lock, and erase a device remotely helps mitigate the impact of
device theft and loss, as well as the likelihood of permanent loss.
This is only recommended for end user-owned devices. Institutionally-owned devices
should not be erasable by end users.
Impact:
Evidence may be destroyed if an end user performs an erase.
Audit:
From the device:
1. Tap Settings.
2. Tap <_The User's Name_> where Apple ID, iCloud, iTunes & App Store is
displayed beneath.
3. Tap Find My.
4. Verify Find My iPhone, Find My Network and Send Last Location are enabled.
Remediation:
From the device:
1. Tap Settings.
2. Tap <_The User's Name_> where Apple ID, iCloud, iTunes & App Store is
displayed beneath.
3. Tap Find My.
4. Enable Find My iPhone, Find My Network and Send Last Location.
Page 211
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 212
4.8 (L2) Ensure the latest iOS device architecture is used by high-
value targets (Manual)
Profile Applicability:
Description:
This recommendation pertains to the physical device(s) used by high-value targets.
Rationale:
Physical security exploits against iOS devices are rarely demonstrated within two years
of the release of the underlying architecture. For users whose physical iOS device(s)
may be targeted, it is prudent to use the most recently released architecture.
Audit:
Ensure the device(s) deployed to high-value targets are of the latest generation
architecture.
Remediation:
Replace the device(s).
As of publication, the latest iOS device architectures are:
• iPhone 13 and iPhone 13 Mini using the Apple A15 Bionic processor
• iPhone 13 Pro and iPhone 13 Pro Max using the Apple A15 Bionic processor
• iPad Mini 8.3" using the Apple A15 Bionic processor
• iPad 10.2" using the Apple A13 Bionic processor
• iPad Air 10.9" using the Apple A14 Bionic processor
• iPad Pro 11" and 12.9" using the Apple M1 processor
Page 213
Additional Information:
Apple provides the following material on identifying iOS device hardware. For iPhone,
see: https://support.apple.com/en-us/HT201296. For iPad, see:
https://support.apple.com/en-us/HT201471.
The term high-value targets is being used to refer to users who may be likely to
experience a physical-level device attack. Examples include:
• Politicians
• Journalists
• Activists
• Civilian government or military personnel
• Business executives
• Wealthy individuals
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 214
Appendix: Summary Table
CIS Benchmark Recommendation Set
Correctly
Yes No
1 Benchmark Guidance
2.1 General
2.2 Restrictions
2.2.1 Functionality
Page 215
CIS Benchmark Recommendation Set
Correctly
Yes No
2.2.2 Applications
2.3 Domains
2.4 Passcode
Page 216
CIS Benchmark Recommendation Set
Correctly
Yes No
2.5 Wi-Fi
2.6 VPN
2.7 Mail
2.8 Notifications
Page 217
CIS Benchmark Recommendation Set
Correctly
Yes No
3.1 General
3.2 Restrictions
3.2.1 Functionality
3.2.1.8 (L2) Ensure "Allow USB drive access in Files app" is set
to "Disabled" (Automated)
Page 218
CIS Benchmark Recommendation Set
Correctly
Yes No
3.2.1.12 (L1) Ensure "Allow Erase All Content and Settings" is set
to "Disabled" (Automated)
Page 219
CIS Benchmark Recommendation Set
Correctly
Yes No
3.2.2 Apps
3.3 Domains
3.4 Passcode
Page 220
CIS Benchmark Recommendation Set
Correctly
Yes No
3.5 Wi-Fi
3.6 VPN
3.7 Mail
3.8 Notifications
Page 221
CIS Benchmark Recommendation Set
Correctly
Yes No
4 Additional Recommendations
Page 222
Appendix: CIS Controls v7 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
2.1.1 (L1) Ensure a "Consent Message" has been "Configured"
2.1.2 (L1) Ensure "Controls when the profile can be removed"
is set to "Always"
2.2.1.1 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
2.2.1.2 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
2.2.1.4 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
2.2.1.6 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
2.2.1.8 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
2.2.1.9 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
2.2.1.10 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
2.2.1.11 (L2) Ensure "Allow Handoff" is set to "Disabled"
2.2.1.13 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
2.2.1.14 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
2.2.1.15 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
2.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
2.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
2.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
Page 223
Recommendation Set
Correctly
Yes No
2.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
2.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
2.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
2.7.2 (L2) Ensure "Allow Mail Drop" is set to "Disabled"
2.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.1.1 (L1) Ensure "Controls when the profile can be removed"
is set to "Never"
3.2.1.1 (L2) Ensure "Allow screenshots and screen recording" is
set to "Disabled"
3.2.1.2 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
3.2.1.3 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
3.2.1.6 (L1) Review "Allow iCloud Keychain" settings
3.2.1.10 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
3.2.1.11 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
3.2.1.12 (L1) Ensure "Allow Erase All Content and Settings" is set
to "Disabled"
3.2.1.13 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
3.2.1.14 (L1) Ensure "Allow trusting new enterprise app authors"
is set to "Disabled"
3.2.1.15 (L1) Ensure "Allow installing configuration profiles" is set
to "Disabled"
3.2.1.18 (L2) Ensure "Allow modifying cellular data app settings"
is set to "Disabled"
3.2.1.21 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
3.2.1.22 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
Page 224
Recommendation Set
Correctly
Yes No
3.2.1.23 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
3.2.1.24 (L1) Ensure "Allow Handoff" is set to "Disabled"
3.2.1.25 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
3.2.1.26 (L1) Ensure "Require Touch ID / Face ID authentication
before AutoFill" is set to "Enabled"
3.2.1.27 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
3.2.1.30 (L1) Ensure "Allow password sharing (supervised only)"
is set to "Disabled"
3.2.1.31 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
3.2.1.32 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
3.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
3.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
3.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
3.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
3.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
3.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
3.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
3.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
3.7.2 (L2) Ensure 'Allow Mail Drop' is set to 'Disabled'
3.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.9.1 (L1) Ensure "If Lost, Return to..." Message is
"Configured"
Page 225
Recommendation Set
Correctly
Yes No
4.1 (L1) Ensure device is not obviously jailbroken
4.2 (L1) Ensure "Install iOS Updates" of "Automatic
Updates" is set to "Enabled"
4.3 (L1) Ensure "Software Update" returns "Your software is
up to date."
4.4 (L1) Review "iCloud Private Relay" settings
4.5 (L1) Review "Mail Privacy Protection" settings
4.6 (L1) Ensure "Automatic Downloads" of "App Updates" is
set to "Enabled"
4.8 (L2) Ensure the latest iOS device architecture is used by
high-value targets
Page 226
Appendix: CIS Controls v7 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
2.1.1 (L1) Ensure a "Consent Message" has been "Configured"
2.1.2 (L1) Ensure "Controls when the profile can be removed"
is set to "Always"
2.2.1.1 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
2.2.1.2 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
2.2.1.3 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
2.2.1.4 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
2.2.1.5 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
2.2.1.6 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
2.2.1.7 (L1) Ensure "Force automatic date and time" is set to
"Enabled"
2.2.1.8 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
2.2.1.9 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
2.2.1.10 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
2.2.1.11 (L2) Ensure "Allow Handoff" is set to "Disabled"
2.2.1.12 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
2.2.1.13 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
2.2.1.14 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
Page 227
Recommendation Set
Correctly
Yes No
2.2.1.15 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
2.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
2.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
2.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
2.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
2.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
2.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
2.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
2.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
2.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
2.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
2.6.1 (L1) Ensure "VPN" is "Configured"
2.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
2.7.2 (L2) Ensure "Allow Mail Drop" is set to "Disabled"
2.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.1.1 (L1) Ensure "Controls when the profile can be removed"
is set to "Never"
3.2.1.1 (L2) Ensure "Allow screenshots and screen recording" is
set to "Disabled"
3.2.1.2 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
3.2.1.3 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
3.2.1.4 (L1) Ensure "Allow iCloud backup" is set to "Disabled"
Page 228
Recommendation Set
Correctly
Yes No
3.2.1.5 (L1) Ensure "Allow iCloud documents & data" is set to
"Disabled"
3.2.1.6 (L1) Review "Allow iCloud Keychain" settings
3.2.1.7 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
3.2.1.8 (L2) Ensure "Allow USB drive access in Files app" is set
to "Disabled"
3.2.1.10 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
3.2.1.11 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
3.2.1.12 (L1) Ensure "Allow Erase All Content and Settings" is set
to "Disabled"
3.2.1.13 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
3.2.1.14 (L1) Ensure "Allow trusting new enterprise app authors"
is set to "Disabled"
3.2.1.15 (L1) Ensure "Allow installing configuration profiles" is set
to "Disabled"
3.2.1.16 (L1) Ensure "Allow adding VPN configurations" is set to
"Disabled"
3.2.1.17 (L1) Ensure "Force automatic date and time" is set to
"Enabled"
3.2.1.18 (L2) Ensure "Allow modifying cellular data app settings"
is set to "Disabled"
3.2.1.19 (L1) Ensure "Allow USB accessories while the device is
locked" is set to "Disabled"
3.2.1.20 (L2) Ensure "Allow pairing with non-Configurator hosts" is
set to "Disabled"
3.2.1.21 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
3.2.1.22 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
3.2.1.23 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
3.2.1.24 (L1) Ensure "Allow Handoff" is set to "Disabled"
Page 229
Recommendation Set
Correctly
Yes No
3.2.1.25 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
3.2.1.26 (L1) Ensure "Require Touch ID / Face ID authentication
before AutoFill" is set to "Enabled"
3.2.1.27 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
3.2.1.30 (L1) Ensure "Allow password sharing (supervised only)"
is set to "Disabled"
3.2.1.31 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
3.2.1.32 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
3.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
3.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
3.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
3.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
3.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
3.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
3.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
3.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
3.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
3.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
3.6.1 (L1) Ensure "VPN" is "Configured"
3.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
3.7.2 (L2) Ensure 'Allow Mail Drop' is set to 'Disabled'
Page 230
Recommendation Set
Correctly
Yes No
3.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.9.1 (L1) Ensure "If Lost, Return to..." Message is
"Configured"
4.1 (L1) Ensure device is not obviously jailbroken
4.2 (L1) Ensure "Install iOS Updates" of "Automatic
Updates" is set to "Enabled"
4.3 (L1) Ensure "Software Update" returns "Your software is
up to date."
4.4 (L1) Review "iCloud Private Relay" settings
4.5 (L1) Review "Mail Privacy Protection" settings
4.6 (L1) Ensure "Automatic Downloads" of "App Updates" is
set to "Enabled"
4.8 (L2) Ensure the latest iOS device architecture is used by
high-value targets
Page 231
Appendix: CIS Controls v7 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
2.1.1 (L1) Ensure a "Consent Message" has been "Configured"
2.1.2 (L1) Ensure "Controls when the profile can be removed"
is set to "Always"
2.2.1.1 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
2.2.1.2 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
2.2.1.3 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
2.2.1.4 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
2.2.1.5 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
2.2.1.6 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
2.2.1.7 (L1) Ensure "Force automatic date and time" is set to
"Enabled"
2.2.1.8 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
2.2.1.9 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
2.2.1.10 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
2.2.1.11 (L2) Ensure "Allow Handoff" is set to "Disabled"
2.2.1.12 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
2.2.1.13 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
2.2.1.14 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
Page 232
Recommendation Set
Correctly
Yes No
2.2.1.15 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
2.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
2.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
2.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
2.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
2.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
2.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
2.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
2.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
2.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
2.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
2.6.1 (L1) Ensure "VPN" is "Configured"
2.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
2.7.2 (L2) Ensure "Allow Mail Drop" is set to "Disabled"
2.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.1.1 (L1) Ensure "Controls when the profile can be removed"
is set to "Never"
3.2.1.1 (L2) Ensure "Allow screenshots and screen recording" is
set to "Disabled"
3.2.1.2 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
3.2.1.3 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
3.2.1.4 (L1) Ensure "Allow iCloud backup" is set to "Disabled"
Page 233
Recommendation Set
Correctly
Yes No
3.2.1.5 (L1) Ensure "Allow iCloud documents & data" is set to
"Disabled"
3.2.1.6 (L1) Review "Allow iCloud Keychain" settings
3.2.1.7 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
3.2.1.8 (L2) Ensure "Allow USB drive access in Files app" is set
to "Disabled"
3.2.1.9 (L2) Ensure "Allow network drive access in Files app" is
set to "Disabled"
3.2.1.10 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
3.2.1.11 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
3.2.1.12 (L1) Ensure "Allow Erase All Content and Settings" is set
to "Disabled"
3.2.1.13 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
3.2.1.14 (L1) Ensure "Allow trusting new enterprise app authors"
is set to "Disabled"
3.2.1.15 (L1) Ensure "Allow installing configuration profiles" is set
to "Disabled"
3.2.1.16 (L1) Ensure "Allow adding VPN configurations" is set to
"Disabled"
3.2.1.17 (L1) Ensure "Force automatic date and time" is set to
"Enabled"
3.2.1.18 (L2) Ensure "Allow modifying cellular data app settings"
is set to "Disabled"
3.2.1.19 (L1) Ensure "Allow USB accessories while the device is
locked" is set to "Disabled"
3.2.1.20 (L2) Ensure "Allow pairing with non-Configurator hosts" is
set to "Disabled"
3.2.1.21 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
3.2.1.22 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
Page 234
Recommendation Set
Correctly
Yes No
3.2.1.23 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
3.2.1.24 (L1) Ensure "Allow Handoff" is set to "Disabled"
3.2.1.25 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
3.2.1.26 (L1) Ensure "Require Touch ID / Face ID authentication
before AutoFill" is set to "Enabled"
3.2.1.27 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
3.2.1.28 (L1) Ensure "Allow setting up new nearby devices" is set
to "Disabled"
3.2.1.29 (L1) Ensure "Allow proximity based password sharing
requests" is set to "Disabled"
3.2.1.30 (L1) Ensure "Allow password sharing (supervised only)"
is set to "Disabled"
3.2.1.31 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
3.2.1.32 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
3.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
3.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
3.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
3.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
3.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
3.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
3.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
3.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
3.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
Page 235
Recommendation Set
Correctly
Yes No
3.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
3.6.1 (L1) Ensure "VPN" is "Configured"
3.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
3.7.2 (L2) Ensure 'Allow Mail Drop' is set to 'Disabled'
3.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.9.1 (L1) Ensure "If Lost, Return to..." Message is
"Configured"
4.1 (L1) Ensure device is not obviously jailbroken
4.2 (L1) Ensure "Install iOS Updates" of "Automatic
Updates" is set to "Enabled"
4.3 (L1) Ensure "Software Update" returns "Your software is
up to date."
4.4 (L1) Review "iCloud Private Relay" settings
4.5 (L1) Review "Mail Privacy Protection" settings
4.6 (L1) Ensure "Automatic Downloads" of "App Updates" is
set to "Enabled"
4.7 (L1) Ensure "Find My iPhone/iPad" is set to "Enabled" on
end user-owned devices
4.8 (L2) Ensure the latest iOS device architecture is used by
high-value targets
Page 236
Appendix: CIS Controls v7 Unmapped
Recommendations
Recommendation Set
Correctly
Yes No
No unmapped recommendations to CIS Controls v7.0
Page 237
Appendix: CIS Controls v8 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
2.1.1 (L1) Ensure a "Consent Message" has been "Configured"
2.1.2 (L1) Ensure "Controls when the profile can be removed"
is set to "Always"
2.2.1.1 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
2.2.1.2 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
2.2.1.3 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
2.2.1.4 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
2.2.1.6 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
2.2.1.8 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
2.2.1.9 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
2.2.1.10 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
2.2.1.11 (L2) Ensure "Allow Handoff" is set to "Disabled"
2.2.1.13 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
2.2.1.14 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
2.2.1.15 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
2.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
2.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
2.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
Page 238
Recommendation Set
Correctly
Yes No
2.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
2.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
2.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
2.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
2.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
2.7.2 (L2) Ensure "Allow Mail Drop" is set to "Disabled"
2.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.1.1 (L1) Ensure "Controls when the profile can be removed"
is set to "Never"
3.2.1.1 (L2) Ensure "Allow screenshots and screen recording" is
set to "Disabled"
3.2.1.2 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
3.2.1.3 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
3.2.1.4 (L1) Ensure "Allow iCloud backup" is set to "Disabled"
3.2.1.5 (L1) Ensure "Allow iCloud documents & data" is set to
"Disabled"
3.2.1.6 (L1) Review "Allow iCloud Keychain" settings
3.2.1.7 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
3.2.1.8 (L2) Ensure "Allow USB drive access in Files app" is set
to "Disabled"
3.2.1.9 (L2) Ensure "Allow network drive access in Files app" is
set to "Disabled"
3.2.1.10 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
3.2.1.11 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
Page 239
Recommendation Set
Correctly
Yes No
3.2.1.12 (L1) Ensure "Allow Erase All Content and Settings" is set
to "Disabled"
3.2.1.13 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
3.2.1.14 (L1) Ensure "Allow trusting new enterprise app authors"
is set to "Disabled"
3.2.1.15 (L1) Ensure "Allow installing configuration profiles" is set
to "Disabled"
3.2.1.18 (L2) Ensure "Allow modifying cellular data app settings"
is set to "Disabled"
3.2.1.19 (L1) Ensure "Allow USB accessories while the device is
locked" is set to "Disabled"
3.2.1.21 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
3.2.1.22 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
3.2.1.23 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
3.2.1.24 (L1) Ensure "Allow Handoff" is set to "Disabled"
3.2.1.25 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
3.2.1.26 (L1) Ensure "Require Touch ID / Face ID authentication
before AutoFill" is set to "Enabled"
3.2.1.27 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
3.2.1.30 (L1) Ensure "Allow password sharing (supervised only)"
is set to "Disabled"
3.2.1.31 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
3.2.1.32 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
3.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
3.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
3.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
Page 240
Recommendation Set
Correctly
Yes No
3.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
3.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
3.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
3.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
3.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
3.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
3.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
3.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
3.7.2 (L2) Ensure 'Allow Mail Drop' is set to 'Disabled'
3.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.9.1 (L1) Ensure "If Lost, Return to..." Message is
"Configured"
4.1 (L1) Ensure device is not obviously jailbroken
4.2 (L1) Ensure "Install iOS Updates" of "Automatic
Updates" is set to "Enabled"
4.3 (L1) Ensure "Software Update" returns "Your software is
up to date."
4.4 (L1) Review "iCloud Private Relay" settings
4.5 (L1) Review "Mail Privacy Protection" settings
4.6 (L1) Ensure "Automatic Downloads" of "App Updates" is
set to "Enabled"
4.8 (L2) Ensure the latest iOS device architecture is used by
high-value targets
Page 241
Appendix: CIS Controls v8 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
2.1.1 (L1) Ensure a "Consent Message" has been "Configured"
2.1.2 (L1) Ensure "Controls when the profile can be removed"
is set to "Always"
2.2.1.1 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
2.2.1.2 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
2.2.1.3 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
2.2.1.4 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
2.2.1.5 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
2.2.1.6 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
2.2.1.7 (L1) Ensure "Force automatic date and time" is set to
"Enabled"
2.2.1.8 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
2.2.1.9 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
2.2.1.10 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
2.2.1.11 (L2) Ensure "Allow Handoff" is set to "Disabled"
2.2.1.12 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
2.2.1.13 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
2.2.1.14 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
Page 242
Recommendation Set
Correctly
Yes No
2.2.1.15 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
2.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
2.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
2.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
2.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
2.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
2.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
2.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
2.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
2.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
2.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
2.6.1 (L1) Ensure "VPN" is "Configured"
2.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
2.7.2 (L2) Ensure "Allow Mail Drop" is set to "Disabled"
2.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.1.1 (L1) Ensure "Controls when the profile can be removed"
is set to "Never"
3.2.1.1 (L2) Ensure "Allow screenshots and screen recording" is
set to "Disabled"
3.2.1.2 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
3.2.1.3 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
3.2.1.4 (L1) Ensure "Allow iCloud backup" is set to "Disabled"
Page 243
Recommendation Set
Correctly
Yes No
3.2.1.5 (L1) Ensure "Allow iCloud documents & data" is set to
"Disabled"
3.2.1.6 (L1) Review "Allow iCloud Keychain" settings
3.2.1.7 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
3.2.1.8 (L2) Ensure "Allow USB drive access in Files app" is set
to "Disabled"
3.2.1.9 (L2) Ensure "Allow network drive access in Files app" is
set to "Disabled"
3.2.1.10 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
3.2.1.11 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
3.2.1.12 (L1) Ensure "Allow Erase All Content and Settings" is set
to "Disabled"
3.2.1.13 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
3.2.1.14 (L1) Ensure "Allow trusting new enterprise app authors"
is set to "Disabled"
3.2.1.15 (L1) Ensure "Allow installing configuration profiles" is set
to "Disabled"
3.2.1.16 (L1) Ensure "Allow adding VPN configurations" is set to
"Disabled"
3.2.1.17 (L1) Ensure "Force automatic date and time" is set to
"Enabled"
3.2.1.18 (L2) Ensure "Allow modifying cellular data app settings"
is set to "Disabled"
3.2.1.19 (L1) Ensure "Allow USB accessories while the device is
locked" is set to "Disabled"
3.2.1.20 (L2) Ensure "Allow pairing with non-Configurator hosts" is
set to "Disabled"
3.2.1.21 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
3.2.1.22 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
Page 244
Recommendation Set
Correctly
Yes No
3.2.1.23 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
3.2.1.24 (L1) Ensure "Allow Handoff" is set to "Disabled"
3.2.1.25 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
3.2.1.26 (L1) Ensure "Require Touch ID / Face ID authentication
before AutoFill" is set to "Enabled"
3.2.1.27 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
3.2.1.29 (L1) Ensure "Allow proximity based password sharing
requests" is set to "Disabled"
3.2.1.30 (L1) Ensure "Allow password sharing (supervised only)"
is set to "Disabled"
3.2.1.31 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
3.2.1.32 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
3.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
3.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
3.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
3.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
3.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
3.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
3.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
3.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
3.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
3.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
Page 245
Recommendation Set
Correctly
Yes No
3.6.1 (L1) Ensure "VPN" is "Configured"
3.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
3.7.2 (L2) Ensure 'Allow Mail Drop' is set to 'Disabled'
3.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.9.1 (L1) Ensure "If Lost, Return to..." Message is
"Configured"
4.1 (L1) Ensure device is not obviously jailbroken
4.2 (L1) Ensure "Install iOS Updates" of "Automatic
Updates" is set to "Enabled"
4.3 (L1) Ensure "Software Update" returns "Your software is
up to date."
4.4 (L1) Review "iCloud Private Relay" settings
4.5 (L1) Review "Mail Privacy Protection" settings
4.6 (L1) Ensure "Automatic Downloads" of "App Updates" is
set to "Enabled"
4.8 (L2) Ensure the latest iOS device architecture is used by
high-value targets
Page 246
Appendix: CIS Controls v8 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
2.1.1 (L1) Ensure a "Consent Message" has been "Configured"
2.1.2 (L1) Ensure "Controls when the profile can be removed"
is set to "Always"
2.2.1.1 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
2.2.1.2 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
2.2.1.3 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
2.2.1.4 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
2.2.1.5 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
2.2.1.6 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
2.2.1.7 (L1) Ensure "Force automatic date and time" is set to
"Enabled"
2.2.1.8 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
2.2.1.9 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
2.2.1.10 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
2.2.1.11 (L2) Ensure "Allow Handoff" is set to "Disabled"
2.2.1.12 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
2.2.1.13 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
2.2.1.14 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
Page 247
Recommendation Set
Correctly
Yes No
2.2.1.15 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
2.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
2.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
2.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
2.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
2.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
2.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
2.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
2.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
2.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
2.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
2.6.1 (L1) Ensure "VPN" is "Configured"
2.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
2.7.2 (L2) Ensure "Allow Mail Drop" is set to "Disabled"
2.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.1.1 (L1) Ensure "Controls when the profile can be removed"
is set to "Never"
3.2.1.1 (L2) Ensure "Allow screenshots and screen recording" is
set to "Disabled"
3.2.1.2 (L1) Ensure "Allow voice dialing while device is locked" is
set to "Disabled"
3.2.1.3 (L1) Ensure "Allow Siri while device is locked" is set to
"Disabled"
3.2.1.4 (L1) Ensure "Allow iCloud backup" is set to "Disabled"
Page 248
Recommendation Set
Correctly
Yes No
3.2.1.5 (L1) Ensure "Allow iCloud documents & data" is set to
"Disabled"
3.2.1.6 (L1) Review "Allow iCloud Keychain" settings
3.2.1.7 (L1) Ensure "Allow managed apps to store data in
iCloud" is set to "Disabled"
3.2.1.8 (L2) Ensure "Allow USB drive access in Files app" is set
to "Disabled"
3.2.1.9 (L2) Ensure "Allow network drive access in Files app" is
set to "Disabled"
3.2.1.10 (L1) Ensure "Force encrypted backups" is set to
"Enabled"
3.2.1.11 (L1) Ensure "Allow personalized ads delivered by Apple"
is set to "Disabled"
3.2.1.12 (L1) Ensure "Allow Erase All Content and Settings" is set
to "Disabled"
3.2.1.13 (L2) Ensure "Allow users to accept untrusted TLS
certificates" is set to "Disabled"
3.2.1.14 (L1) Ensure "Allow trusting new enterprise app authors"
is set to "Disabled"
3.2.1.15 (L1) Ensure "Allow installing configuration profiles" is set
to "Disabled"
3.2.1.16 (L1) Ensure "Allow adding VPN configurations" is set to
"Disabled"
3.2.1.17 (L1) Ensure "Force automatic date and time" is set to
"Enabled"
3.2.1.18 (L2) Ensure "Allow modifying cellular data app settings"
is set to "Disabled"
3.2.1.19 (L1) Ensure "Allow USB accessories while the device is
locked" is set to "Disabled"
3.2.1.20 (L2) Ensure "Allow pairing with non-Configurator hosts" is
set to "Disabled"
3.2.1.21 (L1) Ensure "Allow documents from managed sources in
unmanaged destinations" is set to "Disabled"
3.2.1.22 (L1) Ensure "Allow documents from unmanaged sources
in managed destinations" is set to "Disabled"
Page 249
Recommendation Set
Correctly
Yes No
3.2.1.23 (L1) Ensure "Treat AirDrop as unmanaged destination" is
set to "Enabled"
3.2.1.24 (L1) Ensure "Allow Handoff" is set to "Disabled"
3.2.1.25 (L1) Ensure "Allow sending diagnostic and usage data to
Apple" is set to "Disabled"
3.2.1.26 (L1) Ensure "Require Touch ID / Face ID authentication
before AutoFill" is set to "Enabled"
3.2.1.27 (L1) Ensure "Force Apple Watch wrist detection" is set to
"Enabled"
3.2.1.28 (L1) Ensure "Allow setting up new nearby devices" is set
to "Disabled"
3.2.1.29 (L1) Ensure "Allow proximity based password sharing
requests" is set to "Disabled"
3.2.1.30 (L1) Ensure "Allow password sharing (supervised only)"
is set to "Disabled"
3.2.1.31 (L1) Ensure "Show Control Center in Lock screen" is set
to "Disabled"
3.2.1.32 (L1) Ensure "Show Notification Center in Lock screen" is
set to "Disabled"
3.2.2.1 (L1) Ensure "Force fraud warning" is set to "Enabled"
3.2.2.2 (L1) Ensure "Accept cookies" is set to "From websites I
visit" or "From current website only"
3.3.1 (L1) Ensure "Managed Safari Web Domains" is
"Configured"
3.4.1 (L1) Ensure "Allow simple value" is set to "Disabled"
3.4.2 (L2) Ensure "Require alphanumeric value" is set to
"Enabled"
3.4.3 (L1) Ensure "Minimum passcode length" is set to a value
of "6" or greater
3.4.4 (L1) Ensure "Maximum Auto-Lock" is set to "2 minutes"
or less
3.4.5 (L1) Ensure "Maximum grace period for device lock" is
set to "Immediately"
3.4.6 (L1) Ensure "Maximum number of failed attempts" is set
to "6"
Page 250
Recommendation Set
Correctly
Yes No
3.5.1 (L1) Ensure "Disable Association MAC Randomization" is
"Configured"
3.6.1 (L1) Ensure "VPN" is "Configured"
3.7.1 (L1) Ensure "Allow user to move messages from this
account" is set to "Disabled"
3.7.2 (L2) Ensure 'Allow Mail Drop' is set to 'Disabled'
3.8.1 (L1) Ensure "Notification Settings" are configured for all
"Managed Apps"
3.9.1 (L1) Ensure "If Lost, Return to..." Message is
"Configured"
4.1 (L1) Ensure device is not obviously jailbroken
4.2 (L1) Ensure "Install iOS Updates" of "Automatic
Updates" is set to "Enabled"
4.3 (L1) Ensure "Software Update" returns "Your software is
up to date."
4.4 (L1) Review "iCloud Private Relay" settings
4.5 (L1) Review "Mail Privacy Protection" settings
4.6 (L1) Ensure "Automatic Downloads" of "App Updates" is
set to "Enabled"
4.7 (L1) Ensure "Find My iPhone/iPad" is set to "Enabled" on
end user-owned devices
4.8 (L2) Ensure the latest iOS device architecture is used by
high-value targets
Page 251
Appendix: CIS Controls v8 Unmapped
Recommendations
Recommendation Set
Correctly
Yes No
No unmapped recommendations to CIS Controls v8.0
Page 252
Appendix: Change History
Date Version Changes for this version
Page 253
Date Version Changes for this version
Page 254
Date Version Changes for this version
Page 255
Date Version Changes for this version
Page 256
Date Version Changes for this version
Page 257
Date Version Changes for this version
Page 258