Apple designed the iOS platform with security at its core. Keeping information secureon mobile devices is critical for any user, whether they’re accessing corporate and customerinformation or storing personal photos, banking information, and addresses. Becauseevery user’s information is important, iOS devices are built to maintain a high level of security without compromising the user experience.iOS devices provide stringent security technology and features, and yet also are easy touse. The devices are designed to make security as transparent as possible. Many securityfeatures are enabled by default, so IT departments don’t need to perform extensivecongurations. And some key features, like device encryption, are not congurable, sousers cannot disable them by mistake.For organizations considering the security of iOS devices, it is helpful to understandhow the built-in security features work together to provide a secure mobile computingplatform.iPhone, iPad, and iPod touch are designed with layers of security. Low-level hardwareand rmware features protect against malware and viruses, while high-level OS featuresallow secure access to personal information and corporate data, prevent unauthorizeduse, and help thwart attacks. The iOS security model protects information while still enabling mobile use, third-partyapps, and syncing. Much of the system is based on industry-standard secure designprinciples—and in many cases, Apple has done additional design work to enhancesecurity without compromising usability. This document provides details about how security technology and features areimplemented within the iOS platform. It also outlines key elements that organizationsshould understand when evaluating or deploying iOS devices on their networks.
• System architecture:
The secure platform and hardware foundations of iPhone, iPad,and iPod touch.
• Encryption and Data Protection:
The architecture and design that protects the user’sdata when the device is lost or stolen, or when an unauthorized person attempts touse or modify it.
• Network security:
Industry-standard networking protocols that provide secureauthentication and encryption of data in transmission.
• Device access:
Methods that prevent unauthorized use of the device and enable itto be remotely wiped if lost or stolen.iOS is based on the same core technologies as OS X, and benets from years of hardening and security development. The continued enhancements and additionalsecurity features with each major release of iOS have allowed IT departments inbusinesses worldwide to rapidly adopt and support iOS devices on their networks.
Device KeyGroup Key
Apple Root Certiﬁcate
OS PartitionUser PartitionData Protection ClassApp SandboxEncrypted File SystemSoftwareHardware andFirmware
Security architecture diagram of iOS providesa visual overview of the dierent technologiesdiscussed in this document.