ASD's Blueprint for Secure Cloud

iOS

This section describes the design decisions associated with iOS endpoints configured according to guidance in ASD's Blueprint for Secure Cloud.

Estimated reading time: 1 minute

ASD’s Blueprint for Secure Cloud (the Blueprint) recommends organisations secure iOS for organisation devices based on a variety of hardening guidance including the United States’ (US) National Information Assurance Partnership Protection Profile for Mobile Device Fundamentals version 3.3, the US Department of Defence’s Cyber Exchange Security Technical Implementation Guides (STIGs), the Centre for Internet Security’s Apple iOS Benchmarks, and ASD’s Security Configuration Guidance for Apple iOS Devices.


iOS Configuration

This section describes the design decisions associated with iOS endpoints configured according to guidance in ASD's Blueprint for Secure Cloud.

iOS Security

This section describes the design decisions associated with iOS endpoints configured according to guidance in ASD's Blueprint for Secure Cloud.

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra