
Security certifications for the Secure Enclave Processor
The Secure Enclave Processor (SEP) is a coprocessor that’s fabricated within the system on chip (SoC). It uses encrypted memory and includes a hardware random number generator. The Secure Enclave provides all cryptographic operations for Data Protection key management and maintains the integrity of Data Protection even if the kernel has been compromised. Communication between the Secure Enclave and the application processor is isolated to an interrupt-driven mailbox and to shared memory data buffers.
The Secure Enclave Processor includes a dedicated Secure Enclave Boot ROM. Like the application processor Boot ROM, the Secure Enclave Boot ROM is immutable code that establishes the hardware root of trust for the Secure Enclave.
The Secure Enclave Processor runs sepOS, which is based on an Apple-customized version of the L4 microkernel. This sepOS is signed by Apple, verified by the Secure Enclave Boot ROM, and updated through a personalized software update process.
Here are some built-in services that use the hardware-protected secure key store:
Unlock of device or account (password and biometric)
Hardware encryption, Data Protection, FileVault (data-at-rest)
Secure Boot (firmware and operating system trust and integrity)
Hardware control of camera (FaceTime)
Cryptographic module validation background
The Hardware Cryptographic Module—Apple SEP Secure Key Store Cryptographic Module—comes embedded in the Apple SOC that’s in the following products: The Apple A series for iPhone and iPad, the M series for Mac computers with Apple silicon, the S series for the Apple Watch, and the T series security chip found in Mac computers starting with iMac Pro introduced in 2017.
Apple will pursue U.S. Federal Information Processing Standard (FIPS) 140-2/-3 Security Level 3 for the SEP Secure Key Store Cryptographic Module used by future operating system releases and devices.
In 2019, Apple validated the hardware module against the FIPS 140-2 Security Level 2 requirements and updated the module version identifier to v9.0 to sync with the versions of the corresponding corecrypto User and corecrypto Kernel module validations. In 2019, this included iOS 12, macOS 10.14, tvOS 12, and watchOS 5.
In 2018, Apple synced with the validation of the software cryptographic modules with the operating systems released in 2017: iOS 11, macOS 10.13, tvOS 11, and watchOS 4. The SEP hardware cryptographic module identified as the Apple SEP Secure Key Store Cryptographic Module v1.0 was initially validated against FIPS 140-2 Security Level 1 requirements.
Apple also actively engages in the validation of the corecrypto User and corecrypto Kernel modules for each major release of an operating system. Validation of conformance can only be performed against a final module release version; the validation is formally submitted upon the public release of the operating system.
Cryptographic module validation status
The Cryptographic Module Validation Program (CMVP) maintains the validation status of cryptographic modules under four separate lists depending on their current status:
To be listed on the CMVP Implementation Under Test List, the laboratory must be contracted with Apple to provide testing.
After the testing has been completed by the laboratory, the lab has recommended validation by the CMVP, and the CMVP fees have been paid, the module is then added to the Modules in Process List. The MIP List tracks the progress of the CMVP validation efforts in four phases:
Review Pending: Waiting for CMVP resource to be assigned.
In Review: CMVP resources are performing their validation activities.
Coordination: The lab and the CMVP are resolving any issues found.
Finalization: The activities and formalities related to issuing the certificate.
After validation by the CMVP, the modules are awarded a certificate of conformance and added to the validated cryptographic modules list.
After 5 years or if the module certificate is revoked for some reason, the modules are moved to the “historical” list.
In 2020, the CMVP adopted the international standard ISO/IEC 19790 as the basis for FIPS 140-3.
FIPS 140-3 certifications
The table below shows the 2020 cryptographic modules that are currently being tested by the laboratory for conformance with FIPS 140-3.
Dates | Certificates / Documents | Operating systems / Module info |
---|---|---|
OS release date: 2020 Validation dates: — | Certificates: — Documents: — | Operating systems: iOS 14, macOS 11 Big Sur, tvOS 14, watchOS 7 Name: Apple Corecrypto Module v11.1 Environment: Apple silicon, Secure key store, Hardware, Overall Security Level 2 Type: Hardware Security level: 2 |
See a complete list of cryptographic modules at the NIST Computer Security Resource Center. You can see a list of modules currently being tested at the same website.
FIPS 140-2 certifications
The table below shows the cryptographic modules that are currently being tested and have been tested by the laboratory for conformance with FIPS 140-2.
2019 operating system releases’ Secure Key Store cryptographic module has completed laboratory testing and has been recommended by the laboratory to the CMVP for validation. They are listed on the Modules in Process List. After the CMVP validation has been successfully completed, the CMVP will list them on the validated cryptographic modules list.
Dates | Certificates / Documents | Operating systems / Module info |
---|---|---|
OS release date: 2019 Validation dates: — | Certificates: — Documents: — | Operating systems: iOS 13, macOS 10.15 Catalina, tvOS 13, watchOS 6 Name: Apple Secure Key Store Cryptographic Module v10.0 Type: Hardware Security level: 2 |
OS release date: 2018 Validation dates: 2019-09-10 | Certificates: 3523 Documents: Certificate, Security Policy, Crypto Officer Guidance | Operating systems: iOS 12, macOS 10.14 Mojave, tvOS 12, watchOS 5 Name: Apple Secure Key Store Cryptographic Module v9.0 Type: Hardware Security level: 2 |
OS release date: 2017 Validation dates: 2018-07-10 | Certificates: 3223 Documents: Certificate, Security Policy, Crypto Officer Guidance | Operating systems: iOS 11, macOS 10.13 High Sierra, tvOS 11, watchOS 4 Name: Apple Secure Key Store Cryptographic Module v1.0 Type: Hardware Security level: 1 |
For questions about Apple Security and Privacy Certifications, contact security-certifications@apple.com.