Encryption and Data Protection overview (2024)

Table of Contents

Apple Platform Security

  • Welcome
  • Intro to Apple platform security
    • Hardware security overview
    • Apple SoC security
    • Secure Enclave
      • Face ID and Touch ID security
      • Magic Keyboard with Touch ID
      • Face ID, Touch ID, passcodes and passwords
      • Facial matching security
      • Uses for Face ID and Touch ID
      • Secure intent and connections to the Secure Enclave
    • Hardware microphone disconnect
    • Express Cards with power reserve
    • System security overview
      • Boot process for iPhone and iPad devices
      • Memory safe iBoot implementation
        • Boot process
        • Boot modes
        • Paired recoveryOS restrictions
        • Startup Disk security policy control
        • LocalPolicy signing-key creation and management
        • Contents of a LocalPolicy file for a Mac with Apple silicon
        • Boot process
        • Boot modes
        • Startup Security Utility
        • Firmware password protection
        • recoveryOS and diagnostics environments
    • Signed system volume security
    • Secure software updates
    • Operating system integrity
    • Activating data connections securely
    • Verifying accessories
    • BlastDoor for Messages and IDS
    • Lockdown Mode security
      • Additional macOS system security capabilities
      • System Integrity Protection
      • Trust caches
      • Peripheral processor security
      • Rosetta 2 on a Mac with Apple silicon
      • Direct memory access protections
      • Securely extending the kernel
      • Option ROM security
      • UEFI firmware security in an Intel-based Mac
    • System security for watchOS
    • Random number generation
    • Apple Security Research Device
    • Encryption and Data Protection overview
    • Passcodes and passwords
      • Data Protection overview
      • Data Protection
      • Data Protection classes
      • Keybags for Data Protection
      • Protecting keys in alternative boot modes
      • Protecting user data in the face of attack
      • Sealed Key Protection (SKP)
      • Role of Apple File System
      • Keychain data protection
      • Volume encryption with FileVault
      • Managing FileVault
      • Protecting app access to user data
      • Protecting access to user’s health data
    • Digital signing and encryption
    • App security overview
      • Intro to app security for iOS and iPadOS
      • About App Store security
      • App code signing process
      • Security of runtime process
      • Supporting extensions
      • App protection and app groups
      • Intro to app security for macOS
      • App code signing process
      • Gatekeeper and runtime protection
      • Protecting against malware
      • Controlling app access to files
    • Secure features in the Notes app
    • Secure features in the Shortcuts app
    • Services security overview
      • Apple ID security
      • Managed Apple ID security
      • iCloud security overview
      • iCloud encryption
      • Advanced Data Protection for iCloud
      • Security of iCloud Backup
      • iCloud Private Relay security
      • Account recovery contact security
      • Legacy Contact security
      • Passcode security overview
      • Sign in with Apple security
      • Automatic strong passwords
      • Password AutoFill security
      • App access to saved passwords
      • Password security recommendations
      • Password Monitoring
      • Sending passwords
      • Credential provider extensions
        • iCloud Keychain security overview
        • Secure keychain syncing
        • Secure iCloud Keychain recovery
        • Escrow security for iCloud Keychain
      • Apple Pay security overview
      • Apple Pay component security
      • How Apple Pay keeps users’ purchases protected
        • Card provisioning security overview
        • Adding credit or debit cards to Apple Pay
      • Payment authorisation with Apple Pay
      • Paying with cards using Apple Pay
      • Contactless passes in Apple Pay
      • Rendering cards unusable with Apple Pay
      • Apple Card security
      • Apple Cash security
      • Tap to Pay on iPhone
      • Access using Apple Wallet
      • Access key types
      • Car key security
      • Adding travel and eMoney cards to Apple Wallet
        • IDs in Apple Wallet
        • Security of IDs in Apple Wallet
      • iMessage security overview
      • How iMessage sends and receives messages
      • Secure iMessage name and photo sharing
    • Secure Apple Messages for Business
    • FaceTime security
      • Find My security
      • Locating missing devices
      • Continuity security overview
      • Handoff security
      • iPhone mobile call relay security
      • iPhone Text Message Forwarding security
      • Instant Hotspot security
    • Network security overview
    • TLS security
    • IPv6 security
    • VPN security
      • Secure access to wireless networks
      • Wi-Fi privacy
    • Bluetooth security
    • Ultra Wideband security in iOS
    • Single sign-on security
    • AirDrop security
    • Wi-Fi password sharing security on iPhone and iPad
    • Firewall security in macOS
    • Developer kit security overview
      • Communication security
      • Data security
      • Securing routers with HomeKit
      • Camera security
      • Security with Apple TV
    • SiriKit security
    • WidgetKit security
    • DriverKit security
    • ReplayKit security
    • ARKit security
    • Secure device management overview
    • Pairing model security
      • MDM security overview
      • Configuration enforcement
      • Automated Device Enrolment
      • Activation Lock security
      • Managed Lost Mode and remote wipe
      • Shared iPad security
    • Apple Configurator security
    • Screen Time security
  • Glossary
  • Document revision history
  • Copyright
Encryption and Data Protection overview (1)

The secure boot chain, system security and app security capabilities all help to verify that only trusted code and apps run on a device. Apple devices have additional encryption features to safeguard user data even when other parts of the security infrastructure have been compromised (for example, if a device is lost or is running untrusted code). All these features benefit both users and IT administrators, protecting personal and corporate information and providing methods for instant and complete remote wipe in the case of device theft or loss.

iPhone and iPad devices use a file encryption methodology called Data Protection, whereas the data on an Intel-based Mac is protected with a volume encryption technology called FileVault. A Mac with Apple silicon uses a hybrid model that supports Data Protection, with two caveats: The lowest protection level (Class D) isn’t supported, and the default level (Class C) uses a volume key and acts just like the FileVault on an Intel-based Mac. In all cases, key management hierarchies are rooted in the dedicated silicon of the Secure Enclave, and a dedicated AES Engine supports line-speed encryption and helps ensure that long-lived encryption keys aren’t exposed to the kernel operating system or CPU (where they might be compromised). (An Intel-based Mac with a T1 or lacking a Secure Enclave doesn’t use dedicated silicon to protect its FileVault encryption keys.)

Besides using Data Protection and FileVault to help prevent unauthorised access to data, Apple uses operating system kernels to enforce protection and security. The kernel uses access controls to sandbox apps (which restricts what data an app can access) and a mechanism called a Data Vault (which rather than restricting the calls an app can make, restricts access to the data of an app from all other requesting apps).

See alsoHardware security overviewSystem security overviewApp security overviewServices security overview

Download this guide as a PDF

Helpful?

Thanks for your feedback.

Encryption and Data Protection overview (2024)
Top Articles
Was the Roblox Headless Horseman Really Free?
ESG 101: What Is Environmental, Social, and Governance?
Kostner Wingback Bed
WALB Locker Room Report Week 5 2024
Srtc Tifton Ga
It’s Time to Answer Your Questions About Super Bowl LVII (Published 2023)
Jazmen Jafar Linkedin
Myexperience Login Northwell
Richard Sambade Obituary
GAY (and stinky) DOGS [scat] by Entomb
Www.paystubportal.com/7-11 Login
Cranberry sauce, canned, sweetened, 1 slice (1/2" thick, approx 8 slices per can) - Health Encyclopedia
Chastity Brainwash
Charmeck Arrest Inquiry
Shooting Games Multiplayer Unblocked
Bestellung Ahrefs
Bnsf.com/Workforce Hub
Watch The Lovely Bones Online Free 123Movies
Publix Super Market At Rainbow Square Shopping Center Dunnellon Photos
Robin D Bullock Family Photos
Okc Body Rub
27 Paul Rudd Memes to Get You Through the Week
Rubber Ducks Akron Score
Rust Belt Revival Auctions
What Individuals Need to Know When Raising Money for a Charitable Cause
What Is Opm1 Treas 310 Deposit
Lininii
Alima Becker
Craigslist Free Puppy
Ixlggusd
Smartfind Express Henrico
Log in or sign up to view
Colorado Parks And Wildlife Reissue List
11526 Lake Ave Cleveland Oh 44102
Beaufort SC Mugshots
Joey Gentile Lpsg
Amc.santa Anita
Alpha Labs Male Enhancement – Complete Reviews And Guide
Unveiling Gali_gool Leaks: Discoveries And Insights
Yale College Confidential 2027
Southwest Airlines Departures Atlanta
Avance Primary Care Morrisville
A jovem que batizou lei após ser sequestrada por 'amigo virtual'
Union Supply Direct Wisconsin
Argus Leader Obits Today
Jimmy John's Near Me Open
Is My Sister Toxic Quiz
Congressional hopeful Aisha Mills sees district as an economical model
March 2023 Wincalendar
Zalog Forum
Att Corporate Store Location
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 5795

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.