- Stay Connected with the Apple Admin Community, Slack, and Local Meetups
- Take Out the Trash | How to Clear Pending and Failed Commands in Jamf Pro 10
- Recommendations for Optimizing Wifi for Apple Devices
- Demystifying iOS Deployment in K-12 Edu
- Is NetInstall Dead in Future Releases of macOS? A Discussion for Edu IT
Every iOS device combines software, hardware, and services designed to work together for maximum security and a transparent user experience. iOS protects not only the device and its data at rest, but the entire ecosystem, including everything users do locally, on networks, and with key Internet services.
This iOS security document is organized into the following topic areas:
- System security: The integrated and secure software and hardware that are the platform for iPhone, iPad, and iPod touch.
- Encryption and data:The architecture and design that protects user data if the device is lost or stolen, or if an unauthorized person attempts to use or modify it.
- App security:The systems that enable apps to run securely and without compromising platform integrity.
- Network security: Industry-standard networking protocols that provide secure authentication and encryption of data in transmission.
- Apple Pay: Apple’s implementation of secure payments.
- Internet services: Apple’s network-based infrastructure for messaging, syncing, and backup.
- Device controls: Methods that allow management of iOS devices, prevent unauthorized use, and enable remote wipe if a device is lost or stolen.
- Privacy controls: Capabilities of iOS that can be used to control access to Location Services and user data.
This guide along with the CIS benchmarks provide fundamental information that any sysadmin or MDM coordinator should read when deploying iOS devices. The iOS security recommendations can be evaluated for the unique needs of your organization whether K-12, Higher Ed, government or public entity, or private business. Regular reviews or audits should be performed to see to what degree devices comply with your organization’s standards for security. The CIS benchmarks are really good for this because you simply choose the items you want and score them if devices meet compliance. Some MDM vendors will include scripting and reporting which may help you evaluate compliance.
This day and age, it is important to protect not only data that is sensitive to your organization, but also to protect the end user and personal data on the device itself. iOS security is an important consideration given the prevalence of iPads in the workplace and in education.