
上QQ阅读APP看书,第一时间看更新
iOS security model
In June 2015, Apple released its latest iOS security model. You can find the latest version of this guide at https://www.apple.com/business/docs/iOS_Security_Guide.pdf.
If we look at iOS security guide, iOS provides security right from the hardware level, as shown in the following figure:

At high level, we can divide the preceding architecture in three parts as shown in the following figure:

Some key features of the iOS security model are as follows:
- Security architecture is layered as hardware level, OS level, and application level
- Encryption right from hardware/firmware level
- Application sandboxing
- Data protection using encryption
- Code signing