IOS Security Introduction Mar12
IOS Security Introduction Mar12
Security Introduction
iOS, the operating system at the core of iPhone and iPad, is built upon layers of security.
This enables iPhone and iPad to securely access corporate services and protect important
data. iOS provides strong encryption for data in transmission, proven authentication
methods for access to corporate services, and hardware encryption for all data at rest.
iOS also provides secure protection through the use of passcode policies that can be
delivered and enforced over the air. And if the device falls into the wrong hands, users
and IT administrators can initiate a remote wipe command to erase private information.
When considering the security of iOS for enterprise use, it’s helpful to understand the
following:
• Device security: Methods that prevent unauthorized use of the device
• Data security: Protecting data at rest, even when a device is lost or stolen
• Network security: Networking protocols and the encryption of data in transmission
• App security: The secure platform foundation of iOS
These capabilities work in concert to provide a secure mobile computing platform.
Device Security
Device security Establishing strong policies for access to iPhone and iPad is critical to protecting corporate
• Strong passcodes information. Device passcodes are the front line of defense against unauthorized access
• Passcode expiration and can be configured and enforced over the air. iOS devices use the unique passcode
• Passcode reuse history established by each user to generate a strong encryption key to further protect mail and
• Maximum failed attempts
sensitive application data on the device. Additionally, iOS provides secure methods to
• Over-the-air passcode enforcement
configure the device in an enterprise environment, where specific settings, policies, and
• Progressive passcode timeout
restrictions must be in place. These methods provide flexible options for establishing a
standard level of protection for authorized users.
Passcode policies
A device passcode prevents unauthorized users from accessing data or otherwise gaining
access to the device. iOS allows you to select from an extensive set of passcode requirements
to meet your security needs, including timeout periods, passcode strength, and how
often the passcode must be changed.
The following passcode policies are supported:
• Require passcode on device
• Allow simple value
• Require alphanumeric value
• Minimum passcode length
• Minimum number of complex characters
• Maximum passcode age
• Time before auto-lock
• Passcode history
• Grace period for device lock
• Maximum number of failed attempts
2
Policy enforcement
The policies described previously can be set on iPhone and iPad in a number of ways.
Policies can be distributed as part of a Configuration Profile for users to install. A profile
can be defined so that deleting the profile is only possible with an administrative
password, or you can define the profile so that it is locked to the device and cannot
be removed without completely erasing all of the device contents. Additionally,
passcode settings can be configured remotely using Mobile Device Management
(MDM) solutions that can push policies directly to the device. This enables policies
to be enforced and updated without any action by the user.
Alternatively, if the device is configured to access a Microsoft Exchange account,
Exchange ActiveSync policies are pushed to the device over the air. Keep in mind
that the available set of policies will vary depending on the version of Exchange
(2003, 2007, or 2010). Refer to Exchange ActiveSync and iOS Devices for a breakdown
of which policies are supported for your specific configuration.
Data Security
Data security Protecting data stored on iPhone and iPad is important for any environment with
• Hardware encryption sensitive corporate or customer information. In addition to encrypting data in
• Data protection transmission, iPhone and iPad provide hardware encryption for all data stored on
• Remote wipe the device, and additional encryption of email and application data with enhanced
• Local wipe
data protection.
• Encrypted Configuration Profiles
• Encrypted iTunes backups If a device is lost or stolen, it’s important to deactivate and erase the device. It’s also a
good idea to have a policy in place that will wipe the device after a defined number
of failed passcode attempts, a key deterrent against attempts to gain unauthorized
access to the device.
Encryption
iPhone and iPad offer hardware-based encryption. Hardware encryption uses 256-bit
AES to protect all data on the device. Encryption is always enabled, and cannot be
disabled by users.
Additionally, data backed up in iTunes to a user’s computer can be encrypted.
This can be enabled by the user, or enforced by using device restriction settings in
Configuration Profiles.
iOS supports S/MIME in mail, enabling iPhone and iPad to view and send encrypted
email messages. Restrictions can also be used to prevent mail messages from being
moved between accounts or messages received in one account being forwarded
from another.
Data protection
Building on the hardware encryption capabilities of iPhone and iPad, email messages
and attachments stored on the device can be further secured by using data protection
features built into iOS. Data protection leverages each user’s unique device passcode
in concert with the hardware encryption on iPhone and iPad to generate a strong
encryption key. This key prevents data from being accessed when the device is locked,
ensuring that critical information is secured even if the device is compromised.
To turn on the data protection feature, simply establish a passcode on the device.
The effectiveness of data protection is dependent on a strong passcode, so it
is important to require and enforce a passcode stronger than four digits when
establishing your corporate passcode policies. Users can verify that data protection
is enabled on their device by looking at the passcode settings screen. Mobile Device
Management solutions are able to query the device for this information as well.
These data protection APIs are also available to developers, and can be used to secure
enterprise in-house or commercial application data.
Local wipe
Devices can also be configured to automatically initiate a local wipe after several failed
passcode attempts. This protects against brute force attempts to gain access to the
device. When a passcode is established, users have the ability to enable local wipe
directly within the settings. By default, iOS will automatically wipe the device after 10
failed passcode attempts. As with other passcode policies, the maximum number of
failed attempts can be established via a Configuration Profile, set by an MDM server,
or enforced over the air via Microsoft Exchange ActiveSync policies.
iCloud
iCloud stores music, photos, apps, calendars, documents, and more, and automatically
pushes them to all of a user’s devices. iCloud also backs up information, including
device settings, app data, and text and MMS messages, daily over Wi-Fi. iCloud
secures your content by encrypting it when sent over the Internet, storing it in an
encrypted format, and using secure tokens for authentication. Additionally, iCloud
features, including Photo Stream, Document Sync, and Backup, can be disabled via
a Configuration Profile. For more information on iCloud security and privacy, visit
http://support.apple.com/kb/HT4865.
Network Security
Network security Mobile users must be able to access corporate information networks from anywhere
• Built-in Cisco IPSec, L2TP, PPTP VPN in the world, yet it’s also important to ensure that users are authorized and that their
• SSL VPN via App Store apps data is protected during transmission. iOS provides proven technologies to accomplish
• SSL/TLS with X.509 certificates these security objectives for both Wi-Fi and cellular data network connections.
• WPA/WPA2 Enterprise with 802.1X
• Certificate-based authentication In addition to your existing infrastructure, each FaceTime session and iMessage
• RSA SecurID, CRYPTOCard conversation is encrypted end to end. iOS creates a unique ID for each user, ensuring
communications are encrypted, routed, and connected properly.
Supported certificate formats iOS supports network proxy configuration as well as split IP tunneling so that
iOS supports X.509 certificates with traffic to public or private network domains is relayed according to your specific
RSA keys. The file extensions .cer, .crt, company policies.
and .der are recognized.
5
SSL/TLS
iOS supports SSL v3 as well as Transport Layer Security (TLS v1.0, 1.1, and 1.2), the
next-generation security standard for the Internet. Safari, Calendar, Mail, and other
Internet applications automatically start these mechanisms to enable an encrypted
communication channel between iOS and corporate services.
WPA/WPA2
iOS supports WPA2 Enterprise to provide authenticated access to your enterprise
wireless network. WPA2 Enterprise uses 128-bit AES encryption, giving users the
highest level of assurance that their data will remain protected when they send
and receive communications over a Wi-Fi network connection. And with support
for 802.1X, iPhone and iPad can be integrated into a broad range of RADIUS
authentication environments.
App Security
App security iOS is designed with security at its core. It includes a “sandboxed” approach to
• Runtime protection application runtime protection and requires application signing to ensure that
• Mandatory code signing applications cannot be tampered with. iOS also has a secure framework that
• Keychain services facilitates secure storage of application and network service credentials in an
• CommonCrypto APIs
encrypted keychain. For developers, it offers a common crypto architecture that
• Application data protection
can be used to encrypt application data stores.
Runtime protection
Applications on the device are “sandboxed” so they cannot access data stored by
other applications. In addition, system files, resources, and the kernel are shielded
from the user’s application space. If an application needs to access data from another
application, it can only do so using the APIs and services provided by iOS. Code
generation is also prevented.
Managed apps
An MDM server can manage third-party apps from the App Store, as well as enterprise
in-house applications. Designating an app as managed enables the server to specify
whether the app and its data can be removed from the device by the MDM server.
Additionally, the server can prevent managed app data from being backed up to
iTunes and iCloud. This allows IT to manage apps that may contain sensitive business
information with more control than apps downloaded directly by the user.
In order to install a managed app, the MDM server sends an installation command to
the device. Managed apps require a user’s acceptance before they are installed. For
more information about managed apps, view the Mobile Device Management Overview
at www.apple.com/business/mdm.
© 2012 Apple Inc. All rights reserved. Apple, the Apple logo, FaceTime, iPad, iPhone, iTunes, Safari, and Siri are trademarks of Apple Inc.,
registered in the U.S. and other countries. iMessage is a trademark of Apple Inc. iCloud and iTunes Store are service marks of
Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple, Inc. Other product and company names
mentioned herein may be trademarks of their respective companies. Product specifications are subject to change without notice.
March 2012