STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Apple iOS/iPadOS 18 Security Technical Implementation Guide

V-268047

CAT II (Medium)

Apple iOS/iPadOS 18 must implement the management setting: disable AirDrop.

Rule ID

SV-268047r1115590_rule

STIG

Apple iOS/iPadOS 18 Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

AirDrop is a way to send contact information or photos to other users with this same feature enabled. This feature enables a possible attack vector for adversaries to exploit. Once the attacker has gained access to the information broadcast by this feature, the attacker may distribute this sensitive information very quickly and without DOD's control or awareness. By disabling this feature, the risk of mass data exfiltration will be mitigated. Note: If the site uses Apple's optional Automatic Device Enrollment, this control is available as a supervised MDM control. SFRID: FMT_SMF.1.1 #47

Check Content

Review configuration settings to confirm AirDrop is disabled. 

This is a supervised-only control. If the iPhone or iPad being reviewed is not supervised by the MDM, this control is automatically a finding.

If the iPhone or iPad being reviewed is supervised by the MDM, follow these procedures:

This check procedure is performed on both the device management tool and the iPhone and iPad device.

Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. 

In the iOS/iPadOS management tool, verify "Allow AirDrop" is unchecked.

On the iPhone/iPad device:
1. Open the Settings app.
2. Tap "General".
3. Tap "VPN & Device Management". 
4. Tap the Configuration Profile from the iOS management tool containing the restrictions policy.
5. Tap "Restrictions".
6. Verify "AirDrop not allowed" is listed.

If "AirDrop not allowed" is not listed in the management tool and on the Apple device, this is a finding.

Fix Text

Install a configuration profile to disable the AllowAirDrop control in the management tool. This is a supervised-only control.