STIGQter STIGQter: STIG Summary: Apple iOS 12 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 25 Jan 2019:

Apple iOS must be configured to not allow more than 10 consecutive failed authentication attempts.

DISA Rule

SV-96475r1_rule

Vulnerability Number

V-81761

Group Title

PP-MDF-301050

Rule Version

AIOS-12-000400

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Install a configuration profile to allow only 10 or fewer consecutive failed authentication attempts.

Check Contents

Review configuration settings to confirm that consecutive failed authentication attempts is set to "10" or fewer.

This procedure is performed in the Apple iOS management tool and on the Apple iOS device.

Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review.

In the Management tool, verify the "Maximum number of failed attempts" value is set to "10" or fewer.

Alternatively, verify the text "<key>maxFailedAttempts</key> <integer>10</integer>" appears in the configuration profile (.mobileconfig file). It also is acceptable for the integer value to be less than "10".

On the Apple iOS device:
1. Open the Settings app.
2. Tap "General".
3. Tap "Profiles & Device Management".
4. Tap the Configuration Profile from the iOS management tool containing the password policy.
5. Tap "Restrictions".
6. Tap "Passcode".
7. Verify "Max failed attempts" is listed as "10" or fewer.

If the "Maximum number of failed attempts" is more than "10" in the iOS management tool, "<key>maxFailedAttempts</key> " has an integer value of more than "10", or the password policy on the Apple iOS device from the Apple iOS management tool does not list "Max failed attempts" of "10" or fewer, this is a finding.

Vulnerability Number

V-81761

Documentable

False

Rule Version

AIOS-12-000400

Severity Override Guidance

Review configuration settings to confirm that consecutive failed authentication attempts is set to "10" or fewer.

This procedure is performed in the Apple iOS management tool and on the Apple iOS device.

Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review.

In the Management tool, verify the "Maximum number of failed attempts" value is set to "10" or fewer.

Alternatively, verify the text "<key>maxFailedAttempts</key> <integer>10</integer>" appears in the configuration profile (.mobileconfig file). It also is acceptable for the integer value to be less than "10".

On the Apple iOS device:
1. Open the Settings app.
2. Tap "General".
3. Tap "Profiles & Device Management".
4. Tap the Configuration Profile from the iOS management tool containing the password policy.
5. Tap "Restrictions".
6. Tap "Passcode".
7. Verify "Max failed attempts" is listed as "10" or fewer.

If the "Maximum number of failed attempts" is more than "10" in the iOS management tool, "<key>maxFailedAttempts</key> " has an integer value of more than "10", or the password policy on the Apple iOS device from the Apple iOS management tool does not list "Max failed attempts" of "10" or fewer, this is a finding.

Check Content Reference

M

Target Key

3401

Comments