Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
5Activity
0 of .
Results for:
No results containing your search query
P. 1
iOS Security Guide May 2012

iOS Security Guide May 2012

Ratings: (0)|Views: 434|Likes:
Published by Deepak Gupta (DG)

More info:

Published by: Deepak Gupta (DG) on Jun 05, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/16/2013

pdf

text

original

 
iOS Security
May 2012
 
2
Page 3 IntroductionPage 4 System Architecture
Secure Boot ChainSystem Software PersonalizationApp Code SigningRuntime Process Security
Page 7 Encryption and Data Protection
Hardware Security FeaturesFile Data ProtectionPasscodesClassesKeychain Data ProtectionKeybags
Page 13 Network Security
SSL, TLSVPNWi-FiBluetooth
Page 15 Device Access
Passcode ProtectionConguration EnforcementMobile Device ManagementDevice RestrictionsRemote Wipe
Page 18 Conclusion
A Commitment to Security
Page 19 Glossary
Contents
 
Apple designed the iOS platform with security at its core. Keeping information secureon mobile devices is critical for any user, whether they’re accessing corporate and customerinformation or storing personal photos, banking information, and addresses. Becauseevery user’s information is important, iOS devices are built to maintain a high level of security without compromising the user experience.iOS devices provide stringent security technology and features, and yet also are easy touse. The devices are designed to make security as transparent as possible. Many securityfeatures are enabled by default, so IT departments don’t need to perform extensivecongurations. And some key features, like device encryption, are not congurable, sousers cannot disable them by mistake.For organizations considering the security of iOS devices, it is helpful to understandhow the built-in security features work together to provide a secure mobile computingplatform.iPhone, iPad, and iPod touch are designed with layers of security. Low-level hardwareand rmware features protect against malware and viruses, while high-level OS featuresallow secure access to personal information and corporate data, prevent unauthorizeduse, and help thwart attacks. The iOS security model protects information while still enabling mobile use, third-partyapps, and syncing. Much of the system is based on industry-standard secure designprinciples—and in many cases, Apple has done additional design work to enhancesecurity without compromising usability. This document provides details about how security technology and features areimplemented within the iOS platform. It also outlines key elements that organizationsshould understand when evaluating or deploying iOS devices on their networks.
• System architecture:
 The secure platform and hardware foundations of iPhone, iPad,and iPod touch.
• Encryption and Data Protection:
 The architecture and design that protects the user’sdata when the device is lost or stolen, or when an unauthorized person attempts touse or modify it.
• Network security:
Industry-standard networking protocols that provide secureauthentication and encryption of data in transmission.
• Device access:
Methods that prevent unauthorized use of the device and enable itto be remotely wiped if lost or stolen.iOS is based on the same core technologies as OS X, and benets from years of hardening and security development. The continued enhancements and additionalsecurity features with each major release of iOS have allowed IT departments inbusinesses worldwide to rapidly adopt and support iOS devices on their networks.
Device KeyGroup Key
Apple Root Certificate
Crypto EngineKernel
OS PartitionUser PartitionData Protection ClassApp SandboxEncrypted File SystemSoftwareHardware andFirmware
Introduction
3
Security architecture diagram of iOS providesa visual overview of the dierent technologiesdiscussed in this document.

Activity (5)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
scribbla liked this
sareeee liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->