iOS Hardening Configuration Guide - DSD
iOS Hardening Configuration Guide - DSD
iOS Hardening Configuration Guide - DSD
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
What is in this <strong>Guide</strong><br />
This guide can assist you in securing an <strong>iOS</strong> 4 device. It does not attempt to provide<br />
comprehensive information about securing computers and servers.<br />
This guide includes the following chapters:<br />
Chapter One Introduction to Mobile Device Security Architecture<br />
Chapter Two Installing <strong>iOS</strong> 4<br />
Chapter Three Security Features and Capabilities<br />
Chapter Four Suggested Policies<br />
Chapter Five Recommended Device Profile Settings<br />
Chapter Six Mobile Device Management<br />
Appendix A Security Checklist<br />
Appendix B <strong>Configuration</strong> Profile Format<br />
Appendix C Sample Scripts<br />
Appendix D Example Scenarios<br />
Appendix E Risk Management <strong>Guide</strong><br />
Appendix F Firewall Rules<br />
Note: Because Apple periodically releases new versions and updates to its software, images<br />
shown in this book may vary from what you see on your screen.<br />
3 | D efence Signals Directorate