An M1 chip that powers the new Mac computers with Apple silicon.

Hardware security

Secure software requires a foundation of security built into hardware. That’s why Apple devices—running iOS, iPadOS, macOS, tvOS, or watchOS—have security capabilities designed into silicon.

Learn more about Apple hardware security

Icons representing the operating systems for iPhone, iPod touch, Mac, and iPad.

System security

Building on the unique capabilities of Apple hardware, system security is designed to maximize the security of the operating systems on Apple devices without compromising usability. System security encompasses the startup process, software updates, and the ongoing operation of the operating system.

Learn how Apple protects users with system security

A Mac laptop open showing the icon for FileVault.

Encryption and Data Protection

Apple devices have encryption features to safeguard user data and enable remote wipe in the case of device theft or loss.

Learn more about Apple device and software encryption and Data Protection

Icons representing the App Store for iOS, iPadOS, and macOS extensions.

App security

Apple provides layers of protection designed to ensure that apps are free of known malware and haven’t been tampered with. Other protections help ensure that access from apps to user data is carefully mediated.

Learn how Apple protects users with many layers of app security

Symbols for six of the services that Apple offers: Find My, Wallet, iMessage, iCloud, FaceTime, and Keyboard.

Services security

Apple has built a robust set of services to help users get even more utility and productivity out of their devices. These services include Apple ID, iCloud, Sign in with Apple, Apple Pay, iMessage, FaceTime, and Find My.

Learn how Apple makes its services secure

To browse Apple Platform Security, click Table of Contents at the top of the page. To download a PDF, click or tap here.

Helpful?
Character limit: 250
Maximum character limit is 250.
Thanks for your feedback.