Example: marketing

iOS Security iOS 11 January 2018 - Apple Inc.

IOS Security iOS 11. January 2018. Contents Page 4 Introduction Page 5 System Security Secure boot chain System Software Authorization Secure Enclave Touch ID. Face ID. Page 12 Encryption and Data Protection Hardware Security features File Data Protection Passcodes Data Protection classes Keychain Data Protection Access to Safari saved passwords Keybags Security Certifications and programs Page 23 App Security App code signing Runtime process Security Extensions App Groups Data Protection in apps Accessories HomeKit SiriKit HealthKit ReplayKit Secure Notes Shared Notes Apple Watch Page 36 Network Security TLS.

iOS Security Guide—White Paper | January 2018 2 Contents Page 4 Introduction Page 5 System Security Secure boot chain System Software Authorization

Tags:

  Security

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of iOS Security iOS 11 January 2018 - Apple Inc.

1 IOS Security iOS 11. January 2018. Contents Page 4 Introduction Page 5 System Security Secure boot chain System Software Authorization Secure Enclave Touch ID. Face ID. Page 12 Encryption and Data Protection Hardware Security features File Data Protection Passcodes Data Protection classes Keychain Data Protection Access to Safari saved passwords Keybags Security Certifications and programs Page 23 App Security App code signing Runtime process Security Extensions App Groups Data Protection in apps Accessories HomeKit SiriKit HealthKit ReplayKit Secure Notes Shared Notes Apple Watch Page 36 Network Security TLS.

2 VPN. Wi-Fi Bluetooth Single Sign-on AirDrop Security Wi-Fi password sharing Page 41 Apple Pay Apple Pay components How Apple Pay uses the Secure Element How Apple Pay uses the NFC controller Credit, debit, and prepaid card provisioning Payment authorization iOS Security Guide White Paper | January 2018 2. Transaction-specific dynamic Security code Contactless payments with Apple Pay Paying with Apple Pay within apps Paying with Apple Pay on the web or with Handoff Rewards cards Apple Pay Cash Suica Cards Suspending, removing, and erasing cards Page 52 Internet Services Apple ID.

3 IMessage FaceTime iCloud iCloud Keychain Siri Continuity Safari Suggestions, Siri Suggestions in Search, Lookup, #images, News App, and News Widget in Non-News Countries Page 68 Device Controls Passcode protection iOS pairing model Configuration enforcement Mobile device management (MDM). Shared iPad Apple School Manager Device Enrollment Apple Configurator 2. Supervision Restrictions Remote Wipe Lost Mode Activation Lock Page 75 Privacy Controls Location Services Access to personal data Privacy policy Page 77 Apple Security Bounty Page 78 Conclusion A commitment to Security Page 79 Glossary Page 81 Document Revision History iOS Security Guide White Paper | January 2018 3.

4 Introduction Apple designed the iOS platform with Security at its core. When we set out to create the best possible mobile platform, we drew from decades of experience to build an entirely new architecture. We thought about the Security hazards of the desktop environment, and established a new Data Protection Class approach to Security in the design of iOS. We developed and incorporated innovative features that tighten mobile Security and protect the entire system by default. As a result, iOS is a major leap forward in Security for App Sandbox mobile devices.

5 User Partition Every iOS device combines software, hardware, and services designed to Software (Encrypted) work together for maximum Security and a transparent user experience. iOS protects not only the device and its data at rest, but the entire OS Partition ecosystem, including everything users do locally, on networks, and with key Internet services. File System iOS and iOS devices provide advanced Security features, and yet they're also easy to use. Many of these features are enabled by default, so IT. departments don't need to perform extensive configurations.

6 And key Kernel Security features like device encryption aren't configurable, so users Secure Secure can't disable them by mistake. Other features, such as Face ID, enhance Enclave Element the user experience by making it simpler and more intuitive to secure the device. Hardware and Firmware This document provides details about how Security technology and features are implemented within the iOS platform. It will also help Crypto Engine organizations combine iOS platform Security technology and features with their own policies and procedures to meet their specific Security needs.

7 This document is organized into the following topic areas: Device Key Group Key System Security : The integrated and secure software and hardware that Apple Root Certi cate are the platform for iPhone, iPad, and iPod touch. Security architecture diagram of iOS Encryption and data protection: The architecture and design that provides a visual overview of the protects user data if the device is lost or stolen, or if an unauthorized different technologies discussed in person attempts to use or modify it. this document. App Security : The systems that enable apps to run securely and without compromising platform integrity.

8 Network Security : Industry-standard networking protocols that provide secure authentication and encryption of data in transmission. Apple Pay: Apple 's implementation of secure payments. Internet services: Apple 's network-based infrastructure for messaging, syncing, and backup. Device controls: Methods that allow management of iOS devices, prevent unauthorized use, and enable remote wipe if a device is lost or stolen. Privacy controls: Capabilities of iOS that can be used to control access to Location Services and user data. iOS Security Guide White Paper | January 2018 4.

9 System Security Entering Device Firmware System Security is designed so that both software and hardware are Upgrade (DFU) mode secure across all core components of every iOS device. This includes Restoring a device after it enters the boot-up process, software updates, and Secure Enclave. This DFU mode returns it to a known architecture is central to Security in iOS, and never gets in the way good state with the certainty that of device usability. only unmodified Apple -signed code is present. DFU mode can The tight integration of hardware, software, and services on iOS devices be entered manually.

10 Ensures that each component of the system is trusted, and validates First connect the device to a the system as a whole. From initial boot-up to iOS software updates to computer using a USB cable. third-party apps, each step is analyzed and vetted to help ensure that the hardware and software are performing optimally together and using Then: resources properly. On iPhone X, iPhone 8, or iPhone 8 Plus Press and quickly release the Volume Up button. Secure boot chain Press and quickly release the Each step of the startup process contains components that are Volume Down button.


Related search queries