Dated: 04-12-2024
Ch03. case Study Security Hardening - Mobile Devices - Ios
- CIS Benchmarks case study (Apple iOS 10)
- 3.2.1.12 (L2) Ensure 'Allow modifying cellular data app settings' is set to 'Disabled' (Not Scored)
- Profile applicability:
- Level 2 - Institutionally Owned Devices
- Description: This recommendation pertains to modifying the use of cellular data by apps.
- Rationale:
- It is appropriate for an institution to have remote locating and erasure capability with their devices. Forcing cellular data to remain active is a means of supporting this goal.
- Audit:
- From the Configuration Profile:
- Open Apple Configurator
- Open the Configuration Profile
- In the left windowpane, click on the Restrictions tab.
- In the right windowpane, verify that under the tab Functionality, that the checkbox for Allow modifying cellular data app settings is unchecked.
- Or, from the device:
- Tap Settings.
- Tap General.
- Tap Profile.
- Tap
<_Profile Name_>
. - Tap Restrictions.
- Confirm Changing app cellular data usage not allowed is displayed.
- From the Configuration Profile:
- Remediation:
- Open Apple Configurator.
- Open the Configuration Profile.
- In the left windowpane, click on the Restrictions tab;
- In the right windowpane, under the tab Functionality, uncheck the checkbox for Allow modifying cellular data app settings.
- Deploy the Configuration Profile.
- CIS Controls:
- 5.1 Minimize And Sparingly Use Administrative Privileges Minimize administrative privileges and only use administrative accounts when they are required.
- Implement focused auditing on the use of administrative privileged functions and monitor for anomalous behavior