Introduction to Apple platform security

Apple designs security into the core of its platforms. Building on the 
experience of creating the worldʼs most advanced mobile operating system, Apple 
has created security architectures that address the unique requirements of 
mobile, watch, desktop, and home.

Every Apple device combines hardware, software, and services designed to work 
together for maximum security and a transparent user experience in service of 
the ultimate goal of keeping personal information safe. Custom security 
hardware powers critical security features. Software protections work to keep 
the operating system and third-party apps safe. Services provide a mechanism 
for secure and timely software updates, power a safer app ecosystem, secure 
communications and payments, and provide a safer experience on the Internet. 
Apple devices protect not only the device and its data, but the entire 
ecosystem, including everything users do locally, on networks, and with key 
Internet services.

Just as we design our products to be simple, intuitive, and capable, we design 
them to be secure. Key security features, such as hardware-based device 
encryption, canʼt be disabled by mistake. Other features, such as Touch ID and 
Face ID, enhance the user experience by making it simpler and more intuitive to 
secure the device. And because many of these features are enabled by default, 
users or IT departments donʼt need to perform extensive configurations.

This documentation provides details about how security technology and features 
are implemented within Apple platforms. It also helps organizations combine 
Apple platform security technology and features with their own policies and 
procedures to meet their specific security needs.

The content is organized into the following topic areas:

Hardware Security and Biometrics: The hardware that forms the foundation for 
security on Apple devices, including the Secure Enclave, a dedicated AES crypto 
engine, Touch ID, and Face ID.

System Security: The integrated hardware and software functions that provide 
for the safe boot, update, and ongoing operation of Apple operating systems.

Encryption and Data Protection: The architecture and design that protects user 
data if the device is lost or stolen, or if an unauthorized person attempts to 
use or modify it.

App Security: The software and services that provide a safe app ecosystem and 
enable apps to run securely and without compromising platform integrity.

Services Security: Appleʼs services for identification, password management, 
payments, communications, and finding lost devices.

Network Security: Industry-standard networking protocols that provide secure 
authentication and encryption of data in transmission.

Developer Kits: Frameworks for secure and private management of home and 
health, as well as extension of Apple device and service capabilities to 
third-party apps.

Secure Device Management: Methods that allow management of Apple devices, 
prevent unauthorized use, and enable remote wipe if a device is lost or stolen.

Security Certifications and Programs: Information on ISO certifications, 
Cryptographic validation, Common Criteria Certification, and the Commercial 
Solutions for Classified (CSfC) Program.

https://support.apple.com/guide/security/welcome/web

https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf


_______________________________________________
Medianews mailing list
Medianews@etskywarn.net
http://etskywarn.net/mailman/listinfo/medianews_etskywarn.net

Reply via email to