STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Apple iOS/iPadOS 26 Security Technical Implementation Guide

V-278824

CAT II (Medium)

Apple iOS/iPadOS 26 must disable the installation of alternative marketplace apps.

Rule ID

SV-278824r1151196_rule

STIG

Apple iOS/iPadOS 26 Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366

Discussion

Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DOD data accessible by these unauthorized/malicious applications. SFR ID: FMT_MOF_EXT.1.2 #47

Check Content

This is a supervised-only control. If the iPhone or iPad being reviewed is not supervised by the MDM, this control is automatically a finding.

This check procedure is performed on both the device management tool and the iPhone and iPad.

Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review.

In the iOS management tool, verify "Allow marketplace app installation" is unchecked.

On the iPhone and iPad device:
1. Open the Settings app.
2. Tap "General".
3. Tap "VPN & Device Management".
4. Tap the Configuration Profile from the iOS management tool containing the restrictions policy.
5. Tap "Restrictions".
6. Verify "Marketplace app installation not allowed" is listed.

If "Marketplace app installation" is not disabled in the management tool, this is a finding.

Fix Text

Install a configuration profile to disable the installation of alternative marketplace apps. This is a supervised-only control.

Configuration Profile Key: allowMarketplaceAppInstallation