• Global Nav Open MenuGlobal Nav Close Menu
  • Apple
Search Support
Cancel
  • Apple
  • Mac
  • iPad
  • iPhone
  • TV
  • Music
  • Support
  • Where to Buy
Apple Platform Security
  • Communities
  • Contact Support

Table of Contents

  • Welcome
  • Introduction
    • Hardware security overview
      • Secure Enclave overview
      • Dedicated Boot ROM and anti-replay services
    • Dedicated AES engine
      • Touch ID and Face ID overview
      • Touch ID security
      • Face ID security
      • Touch ID, Face ID, passcodes, and passwords
      • Facial matching
      • Unlocking a device or user account
      • Securing purchases with Apple Pay
      • Other uses for Touch ID and Face ID
    • Hardware microphone disconnect in Mac and iPad
    • Express Cards with power reserve in iPhone
    • System security overview
    • Random number generation
      • iOS and iPadOS secure boot chain
        • macOS boot process
        • macOS boot modes overview
        • recoveryOS and diagnostics environments
        • Internet recoveryOS and diagnostics environments
        • Microsoft Windows boot
        • Mac computers without an Apple T2 Security Chip
        • Startup Security Utility overview
        • Full Security boot policy
        • Medium Security boot policy
        • Media boot policy
        • Firmware Password protection
      • Secure software updates overview
      • Secure software update process
      • iOS and iPadOS system security overview
      • Kernel Integrity Protection
      • System Coprocessor Integrity Protection
      • Pointer Authentication Codes
      • Page Protection Layer
      • macOS system security overview
        • UEFI firmware overview
        • System Management Mode
        • DMA protections
        • Option ROMs
        • OROM sandbox
        • Peripheral firmware security
      • Mandatory access controls
      • System Integrity Protection
      • Kernel extensions
      • watchOS system security overview
      • Apple Watch usage
    • Encryption and Data Protection overview
    • Access to personal data
    • Role of Apple File System
      • Data Protection overview
      • How data files are created and protected
      • Data Protection classes
      • Accessing protected keys in recovery modes
        • Keychain data protection overview
        • Keychain data class protections
        • Keychain access control
      • When FileVault is turned on
      • When FileVault is turned off
      • Deleting FileVault volumes
      • Preventing brute force attacks and malware
        • Using SecureToken
        • Using Bootstrap Token
        • When a user sets up a Mac on their own
        • When a Mac is provisioned by an organization
        • Using command-line tools
      • Passcodes
      • Activating data connections securely
      • Function of passwords
      • Digital signing and encryption
      • Keychain architecture in macOS
      • Keybags overview in iOS and iPadOS
      • User keybag
      • Device keybag
      • Backup keybag
      • Escrow keybag
      • iCloud Backup keybag
    • App security overview
      • iOS and iPadOS app security overview
        • Mandatory code signing
        • How developers sign their apps
        • Verifying enterprise apps
        • Sandboxing
        • Use of entitlements
        • Further protections
      • Supporting extensions
      • Adopting Data Protection in apps
      • Joining an App Group
      • Verifying accessories
      • macOS app security overview
      • App code signing process in macOS
      • Gatekeeper and runtime protection
      • Protecting against malware
      • Controlling app access to files
    • Secure features in Notes app
    • Secure features in Shortcuts app
    • Services security overview
      • Apple ID and Managed Apple ID overview
      • Two-factor authentication
      • Two-step verification
      • Managed Apple IDs
      • iCloud overview
      • iCloud Drive
      • iCloud Backup contents
      • CloudKit end-to-end encryption
      • Passcode and password management overview
      • Sign in with Apple
      • Automatic Strong Passwords
      • Password AutoFill
      • App access to saved passcodes
      • Password reuse and strength auditing
      • Sending passwords to other users or devices
      • Credential provider extensions
        • iCloud Keychain overview
        • Keychain syncing
        • iCloud Keychain recovery
        • Escrow security
        • Safari integration
      • Apple Pay overview
      • Apple Pay components
      • Secure Element and NFC controller
        • Credit, debit, and prepaid card provisioning overview
        • Adding a credit or debit card manually
        • Adding credit or debit cards from an iTunes Store account
        • Adding credit or debit cards from a card issuer’s app
        • Additional verification
      • Payment authorization
      • Transaction-specific dynamic security code
      • Pay with credit and debit cards in stores
      • Pay with credit and debit cards within apps
      • Paying with credit and debit cards on the web
      • Contactless passes
      • Render cards unusable
      • Suspending, removing, and erasing cards
      • Apple Cash
        • Apple Card application in the Wallet app
        • Apple Card payments and Apple Wallet pass details
      • Transit cards
      • Credit and debit cards for transit
      • Student ID cards
      • iMessage overview
      • How iMessage sends and receives messages
      • iMessage name and photo sharing
    • Business Chat
    • FaceTime
      • Find My overview
      • End-to-end encryption
      • Locating missing devices
      • Keeping users and devices anonymous
      • Viewing offline devices
      • Continuity overview
      • Handoff
      • Handoff between native apps and websites
      • Universal Clipboard
      • iPhone cellular call relay
      • iPhone Text Message Forwarding
      • Instant Hotspot
    • Network security overview
    • TLS
    • VPN
      • Protocol security
      • Deprecated protocols
        • MAC address randomization
        • Wi-Fi frame sequence number randomization
        • Connections and hidden networks
      • Platform protections
    • Bluetooth security
    • Ultra Wideband technology
      • Single sign-on
      • Extensible Single sign-on
    • AirDrop security
    • Wi-Fi password sharing
    • Firewall
    • Developer Kits overview
      • HomeKit identity
      • Communication with HomeKit accessories
      • Local data storage
      • Data synchronization between devices and users
      • Home data and apps
      • HomeKit and Siri
      • HomeKit IP cameras
      • HomeKit routers
      • iCloud remote access for HomeKit accessories
      • HomeKit TV Remote accessories
      • Apple TV profiles for HomeKit homes
      • HealthKit overview
      • Clinical health records and Health data integrity
      • Health data access by third-party apps
      • Medical ID for users
    • CloudKit
    • SiriKit
    • DriverKit
      • Movie recording
      • Broadcasting
    • Camera and ARKit
    • Secure device management overview
    • Pairing model
    • Passcode and password settings management
    • Configuration enforcement
    • Mobile device management (MDM)
    • Automated Device Enrollment
    • Apple Configurator 2
    • Device supervision
    • Device restrictions
    • Activation Lock
    • Lost Mode, remote wipe, and remote lock
      • Shared iPad overview
      • Sign in to Shared iPad
      • Sign out of Shared iPad
    • Screen Time
    • Apple security and privacy certifications overview
    • Apple security assurance
  • Glossary
  • Document Revision History
  • Copyright

Apple Footer

 Apple
  1. Support
  2. Apple Platform Security
  3. Apple Platform Security
Jordan
Copyright © 2021 Apple Inc. All rights reserved.
Privacy Policy Terms of Use Site Map