What is in this Guide
This guide aims to assist in securing iOS 5 devices. It does not attempt to provide comprehensive information about securing computers and servers.
This guide includes the following chapters:
Chapter One Introduction to Mobile Device Security Architecture 7
Chapter Two Encryption in iOS 17
Chapter Three Security Features and Capabilities 23
Chapter Four Deploying iOS Devices 29
Chapter Five Suggested Policies 38
Chapter Six Recommended Device Profile Settings 42
Chapter Seven Mobile Device Management 52
Appendix A Security Checklist 54
Appendix B Configuration Profiles Format 58
Appendix C Sample Scripts 60
Appendix D Example Scenarios 63
Appendix E Risk Management Guide 65
Appendix F Firewall Rules 69
From: Hardening Configuration Guide for iPod Touch, iPhone and iPad running iOS5.1 or Higher, DSD, 30 March 2012
Monday, April 02, 2012
Apple iPhone and iPad Approved for Secure Government Use
The Defence Signals Directorate (DSD) have approved the use of Apple iPhones and iPads with classified Australian government information. However, this is only for the newest versions of the iOS operating system (5.1) and only at the lowest level of classification of documents (Protected). There is a DSD "Hardening Configuration Guide for iPod Touch, iPhone and iPad running iOS5.1 or Higher", 72 pages of PDF (30 March 2012) with the details.
No comments:
Post a Comment