Apple ha publicat el document «iOS Security», que documenta l'arquitectura de seguretat del sistema operatiu de l'iPhone, iPad i iTouch, tant des del punt de vista de sistema i xarxa com d'usuari (per exemple, el mecanisme que permet esborrar remotament la informació emmagatzemada en un dispositiu).
This document provides details about how security technology and features are implemented within the iOS platform. It also outlines key elements that organizations should understand when evaluating or deploying iOS devices on their networks.
- System architecture: The secure platform and hardware foundations of iPhone, iPad, and iPod touch.
- Encryption and Data Protection: The architecture and design that protects the user’s data when the device is lost or stolen, or when an nauthorized person attempts to use or modify it.
- Network security: Industry-standard networking protocols that provide secure authentication and encryption of data in transmission.
- Device access: Methods that prevent unauthorized use of the device and enable it to be remotely wiped if lost or stolen.
iOS is based on the same core technologies as OS X, and benefits from years of hardening and security development. The continued enhancements and additional security features with each major release of iOS have allowed IT departments in businesses worldwide to rapidly adopt and support iOS devices on their networks.