705 how ios security really works 04 final - apple inc.€¦ · every single ios security feature...

116
© 2016 Apple Inc. All rights reserved. Redistribution or public display not permitted without written permission from Apple. System Frameworks #WWDC16 Session 705 How iOS Security Really Works Ivan Krstić Head of Security Engineering & Architecture

Upload: others

Post on 29-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

© 2016 Apple Inc. All rights reserved. Redistribution or public display not permitted without written permission from Apple.

System Frameworks #WWDC16

Session 705

How iOS Security Really Works

Ivan Krstić Head of Security Engineering & Architecture

Page 2: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Unprecedented record of our livesMobile Devices Today

Gb of Data

Page 3: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Unprecedented record of our livesMobile Devices Today

Gb of Data

Page 4: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Unprecedented record of our livesMobile Devices Today

Gb of Data

Page 5: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Gb of Data

Unprecedented record of our livesMobile Devices Today

Page 6: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Who Might Be an Attacker

Page 7: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Who Might Be an Attacker

Criminals

Page 8: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Who Might Be an Attacker

CriminalsBusiness competitors

Page 9: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Who Might Be an Attacker

CriminalsBusiness competitorsService providers

Page 10: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Who Might Be an Attacker

CriminalsBusiness competitorsService providersNation states

Page 11: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Who Might Be an Attacker

CriminalsBusiness competitorsService providersNation statesRomantic partners, family, friends

Page 12: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Who Might Be an Attacker

CriminalsBusiness competitorsService providersNation statesRomantic partners, family, friendsCats

Page 13: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 14: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

What Do Attackers Want?

Page 15: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

What Do Attackers Want?

Personal stalking and surveillance

Page 16: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

What Do Attackers Want?

Personal stalking and surveillanceCorporate espionage

Page 17: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

What Do Attackers Want?

Personal stalking and surveillanceCorporate espionageDirect financial benefit

Page 18: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

How Do We Know This?We see it on other platforms

Page 19: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

But Not on iOSNo malware has affected iOS devices at scale

Page 20: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Security

Page 21: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Security

Decade-long effort to protect customers from security problems

Page 22: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Security

Decade-long effort to protect customers from security problemsIncredible scale

Page 23: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Security

Decade-long effort to protect customers from security problemsIncredible scale Every single iOS security feature is designed to thwart a real security threat

Page 24: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Security Pillars

Page 25: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Platform Security

Users Upgrading their Software

Developers Building Secure Apps

Page 26: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Platform Security

Users Upgrading their Software

Developers Building Secure Apps

Page 27: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Traditional Security

physical security

secure configuration

installing latest patches

password policy

vetted apps

mandated policies

Page 28: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Traditional Security

physical security

secure configuration

installing latest patches

password policy

vetted apps

mandated policies

iOS Security

security built from silicon up

secure default settings

easy updates

Touch ID

App Store

ease of use

Page 29: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 30: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 31: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 32: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 33: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 34: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Trust built from silicon up

Page 35: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Page 36: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Page 37: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Apple Public Key

Page 38: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Apple Public Key

Apple Public Key

Page 39: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Low-Level Bootloader

(LLB)

Apple Public Key

Apple Public Key

?

Page 40: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Low-Level Bootloader

(LLB)

Apple Public Key

Apple Public Key

?

Page 41: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Low-Level Bootloader

(LLB)iBoot

Apple Public Key

Apple Public Key

?

Page 42: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Low-Level Bootloader

(LLB)iBoot

Apple Public Key

Apple Public Key

?

Page 43: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Low-Level Bootloader

(LLB)iBoot Kernel

Apple Public Key

Apple Public Key

?

Page 44: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Low-Level Bootloader

(LLB)iBoot Kernel

Apple Public Key

Apple Public Key

?

Page 45: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Low-Level Bootloader

(LLB)iBoot Kernel iOS

Apple Public Key

Apple Public Key

?

Page 46: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Application Processor

Boot ROM

Low-Level Bootloader

(LLB)iBoot Kernel iOS

Apple Public Key

Apple Public Key

Page 47: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Trusting Secure Boot

Page 48: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Trusting Secure Boot

Keys are securely provisioned and managed by Apple

Page 49: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Trusting Secure Boot

Keys are securely provisioned and managed by AppleSoftware updates are authorized individually for each device

Page 50: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 51: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 52: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Data Protection

Page 53: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Data Protection

User data is encrypted at rest with keys derived from the passcode

Page 54: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Data Protection

User data is encrypted at rest with keys derived from the passcodeEntangled with hardware key in SEP

Page 55: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Data Protection

Page 56: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Data Protection

SEP refuses to unlock after more than 10 incorrect passcode attempts

Page 57: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Data Protection

SEP refuses to unlock after more than 10 incorrect passcode attempts‘Erase Data’ only controls erasure, not ability to unlock

Page 58: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 59: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Standard algorithmsInternal security audits3rd-party code review

Page 60: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 61: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 62: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 63: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Isolating data between apps App

Page 64: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 65: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

TransparencyConsentControl

Page 66: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 67: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 68: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Code Signing

Page 69: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Code Signing

Attacker’s first step: code executioniOS code signing covers not just the OS, but every app that runs

Page 70: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 71: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure Boot

Data Protection

Sandboxing

Code Signing

Touch ID

1

2

3

4

5

Page 72: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Average user unlocks per day

80

Page 73: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 74: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

EasyFastProtects user data

Page 75: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 76: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Secure EnclaveSensor

Touch ID

Page 77: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Link encrypted with Shared Secret

Secure EnclaveSensor

Touch ID

Page 78: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Link encrypted with Shared Secret

Secure EnclaveSensor

Touch ID

Page 79: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Link encrypted with Shared Secret

Secure EnclaveSensor

Touch ID

Page 80: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Link encrypted with Shared Secret

Secure EnclaveSensor

Touch ID

Page 81: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Link encrypted with Shared Secret 01001010

10100101

01010001

11100010

Secure EnclaveSensor

Touch ID

Page 82: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Link encrypted with Shared Secret 01 01 10

10 0 101

010 0 1

1 10 0

Secure EnclaveSensor

Touch ID

Page 83: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Passcode usage before Touch ID

49%

Page 84: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

49%

89%

Passcode usage after Touch ID

Page 85: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Platform Security

Users Upgrading their Software

Developers Building Secure Apps

Page 86: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Platform Security

Users Upgrading their Software

Developers Building Secure Apps

Page 87: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 88: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Smaller install footprint

5GB

4GB

3GB

2GB

1GB

Page 89: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS 8 iOS 9

Smaller install footprint

5GB

4GB

3GB

2GB

1GB

Page 90: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS 8 iOS 9

Smaller install footprint

5GB 4.6GB

4GB

3GB

2GB

1GB

Page 91: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS 8 iOS 9

Smaller install footprint

5GB 4.6GB

1.3GB

4GB

3GB

2GB

1GB

Page 92: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 93: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

5%iOS 8 11%

iOS 9 84%

iOS Installed Base

Page 94: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Earlier 89.9%

6.0 10.1%

Android Installed Base

Page 95: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Platform Security

Users Upgrading their Software

Developers Building Secure Apps

Page 96: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Platform Security

Users Upgrading their Software

Developers Building Secure Apps

Page 97: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Follow Best Practices

Page 98: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Follow Best Practices

Touch IDApp Transport Security

Page 99: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Follow Best Practices

Touch IDApp Transport Security• Required by App Store at end of 2016

NEW

Page 100: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Follow Best Practices

Touch IDApp Transport Security• Required by App Store at end of 2016• TLS v1.2, with exceptions for already-

encrypted bulk data like media streaming

NEW

Page 101: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Know Your Code

Page 102: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Know Your Code

You are responsible for third-party code you include in your apps

Page 103: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Know Your Code

You are responsible for third-party code you include in your appsLibraries you use may undermine app security

Page 104: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Know Your Code

You are responsible for third-party code you include in your appsLibraries you use may undermine app securityKeep them current!

Page 105: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Platform Security

Users Upgrading their Software

Developers Building Secure Apps

Page 106: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

iOS Platform Security

Users Upgrading their Software

Developers Building Secure Apps

Page 107: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

How well are we doing?

Page 108: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

No iOS malware at scale

Page 109: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

5-10 vulnerabilities

Page 110: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

$1 million

Page 111: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Security is a process, not a destination

Page 112: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform
Page 113: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

More Information

https://developer.apple.com/wwdc16/705

Page 114: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Related Sessions

What’s New in Security Nob Hill Tuesday 5:00PM

Engineering Privacy for Your Users Pacific Heights Wednesday 4:00PM

Page 115: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform

Labs

Security & Privacy Lab 1 Frameworks Lab C Wednesday 9:00AM

Security & Privacy Lab 2 Frameworks Lab B Thursday 9:00AM

Page 116: 705 How iOS Security Really Works 04 FINAL - Apple Inc.€¦ · Every single iOS security feature is designed to thwart a real security threat. iOS Security Pillars. iOS Platform