iOS
This section describes the design decisions associated with iOS endpoints configured according to guidance in ASD's Blueprint for Secure Cloud.
Estimated reading time: 1 minute
ASD’s Blueprint for Secure Cloud (the Blueprint) recommends organisations secure iOS for organisation devices based on a variety of hardening guidance including the United States’ (US) National Information Assurance Partnership Protection Profile for Mobile Device Fundamentals version 3.3, the US Department of Defence’s Cyber Exchange Security Technical Implementation Guides (STIGs), the Centre for Internet Security’s Apple iOS Benchmarks, and ASD’s Security Configuration Guidance for Apple iOS Devices.
iOS Configuration
This section describes the design decisions associated with iOS endpoints configured according to guidance in ASD's Blueprint for Secure Cloud.
iOS Security
This section describes the design decisions associated with iOS endpoints configured according to guidance in ASD's Blueprint for Secure Cloud.