Security Configuration Benchmark For
October 30th, 2009
Apple iPhone OS 3.1.2
Copyright 2001-2009, The Center for Internet Security
2 | P a g e
CIS provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services and materials
from the CIS website or elsewhere (“Products”) as a public service to Internet users worldwide. Recommendations
contained in the Products (“Recommendations”) result from a consensus-building process that involves many security
experts and are generally generic in nature. The Recommendations are intended to provide helpful information to
organizations attempting to evaluate or improve the security of their networks, systems and devices. Proper use of the
Recommendations requires careful analysis and adaptation to specific user requirements. The Recommendations are
not in any way intended to be a “quick fix” for anyone’s information security needs.
No representations, warranties and covenants.
CIS makes no representations, warranties or covenants whatsoever as to (i) the positive or negative effect of the
Products or the Recommendations on the operation or the security of any particular network, computer system,
network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability, timeliness
or completeness of any Product or Recommendation. CIS is providing the Products and the Recommendations “as is”
and “as available” without representations, warranties or covenants of any kind.
By using the Products and/or the Recommendations, I and/or my organization (“we”) agree and acknowledge that:
No network, system, device, hardware, software or component can be made fully secure;
We are using the Products and the Recommendations solely at our own risk;
We are not compensating CIS to assume any liabilities associated with our use of the Products or the Reco