STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Apple iOS/iPadOS 26 Security Technical Implementation Guide

V-278829

CAT II (Medium)

Apple iOS/iPadOS 26 must disable the ability to hide apps.

Rule ID

SV-278829r1150734_rule

STIG

Apple iOS/iPadOS 26 Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366

Discussion

Hidden apps cannot be seen by enterprise management applications (e.g., MDM server), and therefore, unauthorized apps or apps with embedded malware could be installed and hidden from the MDM or mobile threat detection (MTD) apps. Hidden apps may lead to the compromise of sensitive DOD data or provide a vector to attacks on the DOD network. SFR ID: FMT_MOF_EXT.1.2 #47

Check Content

This check procedure is performed on the device management tool and the iPhone and iPad.

Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review.

In the iOS management tool, verify "Allow Apps to be hidden" is unchecked.

On the iPhone and iPad device:
1. Open the Settings app.
2. Tap "Apps".
3. At the bottom of the list of Apps, tap "Hidden Apps".
4. Verify there are no hidden apps listed.

If "Allow Apps to be hidden" is not disabled in the management tool or there are hidden apps installed on enterprise iPhones and iPads, this is a finding.

Fix Text

Install a configuration profile to disable hiding apps on iPhones and iPads.

Configuration Profile Key: allowAppsToBeHidden