Apple details iOS security

Powered by SC Magazine
 

The notoriously secretive company has released a security document on iOS.

In a surprising move, Apple has gone public with its iOS security features releasing a detailed guide that highlights the technical specs of its products.

The 18-page document, considered the computing giant's first public address of its security engineering, covers system architecture, encryption, data protection and network security for devices running on iOS, which includes the iPhone, iPad and iPod Touch.

Although a majority of the features discussed in the report have been uncovered by researchers through reverse engineering, one notable topic covered by the document is the multiple security layers implemented into each iOS device.

“The combination of required code signing, sandboxing and entitlements in apps provides solid protection against viruses, malware and other exploits that compromise the security of other platforms,” states the manual.

Additionally, the report includes insight into the mobile operating system's use of address space layout randomization (ASLR), a feature designed to mitigate exploits and stifle saboteurs from corrupting a device's memory with malware.

ASLR was previously assumed to be in use by researchers, but the topic was never publicly discussed by Apple.

“Built-in apps use ASLR to ensure that all memory regions are random­ised upon launch,” the security report stated. "Additionally, system shared library locations are randomized at each device startup."

Although Apple has primarily played its cards close to its chest when it comes to security, the information in the guide could signify a shift in its communication with the public. Charlie Miller, principal research consultant at Accuvant Labs, believes the company may be more concerned with its “acceptance in the enterprise market.”

“[The guide] is located on the enterprise portion of the website,” Miller said in an email to SCMagazine.com.

While the guide is a sign that Apple is coming out of its security shell, Miller says that this shouldn't be seen as a new stance on the topic.

“I've thought that a few times…and have been proven wrong, so from now on I need more convincing before I say that again.”

A spokesperson for Apple was not available for comment.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Apple details iOS security
Tags
 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1068

Vote