iCloud data security overview (2024)

iCloud uses strong security methods, employs strict policies to protect your information, and leads the industry in using privacy-preserving security technologies like end-to-end encryption for your data.

iCloud data security and encryption

The security of your data in iCloud starts with the security of your Apple ID. All new Apple IDs requiretwo-factor authenticationto help protect you from fraudulent attempts to gain access to your account. Two-factor authentication is also required for many features across Apple’s ecosystem, including end-to-end encryption.

Apple offers two options to encrypt and protect the data you store in iCloud:

  • Standard data protectionis the default setting for your account. Your iCloud data is encrypted, the encryption keys are secured in Apple data centersso we can help you with data recovery, and only certain data is end-to-end encrypted.
  • Advanced Data Protection for iCloudis an optional setting that offers our highest level of cloud data security. If you choose to enable Advanced Data Protection, your trusted devices retain sole access to the encryption keys for the majority of your iCloud data, thereby protecting it using end-to-end encryption. Additional data protected includes iCloud Backup, Photos, Notes, and more.

About end-to-end encrypted data

End-to-end encrypted data can be decrypted only on your trusted devices where you’re signed in with your Apple ID. No one else can access your end-to-end encrypted data — not even Apple — and this data remains secure even in the case of a data breach in the cloud. If you lose access to your account, only you can recoverthisdata, using your device passcode or password,recovery contact, orrecovery key.

Standard data protection

Standard data protection is the default setting for your account.Your iCloud data is encrypted in transit and stored in an encrypted format at rest. The encryption keys from your trusted devices are secured in Apple data centers, so Apple can decrypt your data on your behalf whenever you need it, such as when you sign in on a new device, restore from a backup, or recover your data after you’ve forgotten your password. As long as you can successfully sign in with your Apple ID, you can access your backups, photos, documents, notes, and more.

For additional privacy and security, 14 data categories — including Health and passwords in iCloud Keychain — are end-to-end encrypted. Apple doesn't have the encryption keys for these categories, and we can't help you recover this data if you lose access to your account. The table below includes a list of data categories that are always protected by end-to-end encryption.

Advanced Data Protection for iCloud

Starting with iOS 16.2, iPadOS 16.2 and macOS 13.1, you can choose to enable Advanced Data Protection to protect the vast majority of your iCloud data, even in the case of a data breach in the cloud.

With Advanced Data Protection, the number of data categories that use end-to-end encryption rises to 23 and includes your iCloud Backup, Photos, Notes, and more. The table below lists the additional data categories that are protected by end-to-end encryption when you enable Advanced Data Protection.

If you enable Advanced Data Protection and then lose access to your account, Apple will not have the encryption keys to help you recover it — you’ll need to use your device passcode or password, arecovery contact, or a personalrecovery key. Because the majority of your iCloud data will be protected by end-to-end encryption, you’ll be guided to set up at least one recovery contact or recovery key before you turn on Advanced Data Protection. You must also update all your Apple devices to a software version that supports this feature.

You can turn off Advanced Data Protection at any time. Your device will securely upload the required encryption keys to Apple servers, and your account will once again use standard data protection.

Learn how toturn on Advanced Data Protection for iCloud.

Data categories and encryption

The table below provides more detail on how iCloud protects your data when using standard data protection or Advanced Data Protection.

Data categoryStandard data protectionAdvanced Data Protection
EncryptionKey storageEncryptionKey storage
iCloud Mail(1)In transit& on serverAppleIn transit& on serverApple
Contacts(2)In transit & on serverAppleIn transit & on serverApple
Calendars(2)In transit & on serverAppleIn transit & on serverApple
iCloud Backup (including device and Messages backup)(3)In transit & on serverAppleEnd-to-endTrusted devices
iCloud Drive(4)In transit & on serverAppleEnd-to-endTrusted devices
PhotosIn transit & on serverAppleEnd-to-endTrusted devices
NotesIn transit & on serverAppleEnd-to-endTrusted devices
Reminders(5)In transit & on serverAppleEnd-to-endTrusted devices
Safari BookmarksIn transit & on serverAppleEnd-to-endTrusted devices
Siri ShortcutsIn transit & on serverAppleEnd-to-endTrusted devices
Voice MemosIn transit & on serverAppleEnd-to-endTrusted devices
Wallet passesIn transit & on serverAppleEnd-to-endTrusted devices
Passwords and Keychain(6)End-to-endTrusted devicesEnd-to-endTrusted devices
Health dataEnd-to-endTrusted devicesEnd-to-endTrusted devices
Home dataEnd-to-endTrusted devicesEnd-to-endTrusted devices
Messages in iCloud (7)End-to-end (7a)Trusted devicesEnd-to-endTrusted devices
Payment informationEnd-to-endTrusted devicesEnd-to-endTrusted devices
Apple Card transactionsEnd-to-endTrusted devicesEnd-to-endTrusted devices
Maps(8)End-to-endTrusted devicesEnd-to-endTrusted devices
QuickType Keyboard learned vocabularyEnd-to-endTrusted devicesEnd-to-endTrusted devices
Safari(9)End-to-endTrusted devicesEnd-to-endTrusted devices
Screen TimeEnd-to-endTrusted devicesEnd-to-endTrusted devices
Siri information(10)End-to-endTrusted devicesEnd-to-endTrusted devices
Wi-Fi passwordsEnd-to-endTrusted devicesEnd-to-endTrusted devices
W1 and H1 Bluetooth keysEnd-to-endTrusted devicesEnd-to-endTrusted devices
MemojiEnd-to-endTrusted devicesEnd-to-endTrusted devices

Additional notes

  1. iCloud Mail: iCloud Mail does not use end-to-end encryption because of the need to interoperate with the global email system. All nativeApple email clients support optional S/MIME for message encryption.
  2. Contacts and Calendars: Contacts and calendars are built on industry standards (CalDAV and CardDAV) that do not provide built-in support for end-to-end encryption.
  3. iCloud Backup (including device and Messages backup)
    a. Standard data protection
    : When iCloud Backup is enabled, the keys to your backupsare secured in Apple data centers. If you use both iCloud Backup andMessages in iCloud, your backup includes a copy of the Messages in iCloud encryption key to help you recover your data.
    b. Advanced Data Protection: iCloud Backup and everything inside it is end-to-end encrypted, including the Messages in iCloud encryption key.
  4. iCloud Drive: Includes Pages, Keynote, and Numbers documents, PDFs, Safari downloads, or any other files manually or automatically saved to iCloud Drive.
  5. Reminders:Reminders synced using CalDAV don’t support end-to end encryption.
  6. Passwords and Keychain: Includes your saved accounts and passwords.
  7. Messages in iCloud
    a. Standard data protection
    :Messages in iCloudis end-to-end encrypted when iCloud Backup is disabled.When iCloud Backup is enabled, your backup includes a copy of the Messages in iCloud encryption key to help you recover your data. If you turn off iCloud Backup, a new key is generated on your device to protect future Messages in iCloud. This key is end-to-end encrypted between your devices and isnʼt stored by Apple.
    b. Advanced Data Protection:Messages in iCloudis always end-to-end encrypted. When iCloud Backup is enabled, everything inside it is end-to-end encrypted, including the Messages in iCloud encryption key.
  8. Maps: Includes Favorites, My Guides, and Search History.
  9. Safari: Includes History, Tab Groups, and iCloud Tabs.
  10. Siri information: Includes Siri Settings and personalization and, if you have set up Hey Siri, a small sample of your requests.

Encryption of certain metadata and usage information

Some metadata and usage information stored in iCloud remains under standard data protection, even when Advanced Data Protection is enabled. For example, dates and times when a file or object was modified are used to sort your information, and checksums of file and photo data are used to help Apple de-duplicate and optimize your iCloud and device storage — all without having access to the files and photos themselves. Representative examples are provided in the table below.

This metadata is always encrypted, but the encryption keys are still stored by Apple. As we continue to strengthen security protections for all users, Apple is committed to ensuring more data, including this kind of metadata, is end-to-end encrypted when Advanced Data Protection is enabled.

Data categoryInformation protected with standard data encryption
iCloud Backup
  • Name, model, color, and serial number of the device associated with each backup
  • List of apps and file formats that are included in the backup
  • Date, time, and size of each backup snapshot
iCloud Drive
  • The raw byte checksums of the file content and the file name
  • Type of file, when it was created, last modified, or last opened
  • Whether the file has been marked as a favorite
  • Size of the file
  • Signature of any app installers (.pkg signature) and bundle signature
  • Whether a synced file is an executable
Photos
  • The raw byte checksum of the photo or video
  • Whether an item has been marked as a favorite, hidden, ormarked as deleted
  • When the item was originally created on the device
  • When the item was originally imported and modified
  • How many times an item has been viewed
Notes
  • Date and time when the note was created, last modified, or last viewed
  • Whether the note has been pinned or marked as deleted
  • Whether the note contains a drawing or handwriting
  • The raw byte checksum of content from an imported or migrated note
Safari Bookmarks
  • Whether the bookmark resides in the favorites folder
  • When the bookmark was last modified
  • Whether the bookmark has been marked as deleted
Messages in iCloud
  • When the last sync was completed and whether syncing has been disabled
  • Date when content was last modified
  • Error codes
  • Type of message, such as a normal iMessage, SMS, or tapback

Sharing and collaboration

With standard data protection, iCloud content that you share with other people is not end-to-end encrypted.

Advanced Data Protection is designed to maintain end-to-end encryption for shared content as long as all participants have Advanced Data Protection enabled. This level of protection is supported in most iCloud sharing features, including iCloud Shared Photo Library, iCloud Drive shared folders, and shared Notes.

iWork collaboration, the Shared Albums feature in Photos, and sharing content with “anyone with the link,” do not support Advanced Data Protection. When you use these features, the encryption keys for the shared content are securely uploaded to Apple data centers so that iCloud can facilitate real-time collaboration or web sharing. This means the shared content is not end-to-end encrypted, even when Advanced Data Protection is enabled.

To initiate sharing or collaboration, the names and Apple IDs of participants are sent to Apple servers, and a title and representative thumbnail of the shared item may be used to show a preview to the participants.

iCloud.com and data access on the web

iCloud.com provides access to your iCloud data via any web browser. All sessions at iCloud.com are encrypted in transit between Apple's servers and the browser on your device. When Advanced Data Protection is enabled, access to your data via iCloud.com is disabled by default. You have the option to turn on data access on iCloud.com, which allows the web browser that you're using and Apple to have temporary access to data-specific encryption keys provided by your device to decrypt and view your information. Learn moreabout iCloud.com web access.

Third-party app data

Third-party app data stored in iCloud is always encrypted in transit and on server. When you turn on Advanced Data Protection, third-party app data stored in iCloud Backup and CloudKit encrypted fields and assets are end-to-end encrypted.

About third-party data centers

Both Apple and third-party data centers may be used to store and process your data. When processing data stored in a third-party data center, encryption keys are accessed only by Apple software running on secure servers, and only while conducting the necessary processing. The keys are always stored and secured in Apple data centers. Apple doesn't access or store keys for any end-to-end encrypted data.

iCloud data security overview (1)

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsem*nt. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date:

iCloud data security overview (2024)

FAQs

Will I lose messages if I reset end-to-end encrypted data? ›

Will I lose messages if I reset end-to-end encrypted data? Technically, it will erase your messages. But if you have iCloud Backup enabled, your backup includes a copy of the key safeguarding your messages. Therefore, you'll be able to restore your messages.

What happens when you reset encrypted data iPhone? ›

What you will lose is the Home data, Health data, iCloud Keychain, Payment information, Siri, Wi-Fi network, etc. Additionally, resetting end-to-end encrypted data will reset many other settings on your device.

What happens if I delete encrypted files in iCloud? ›

If you delete an encrypted file, it will automatically be deleted from the Drive for everyone, including the collaborators.

How can I improve iCloud security? ›

Here are the basic steps you should to increase your iCloud security.
  1. Step 1: Create a strong password. ...
  2. Step 2: Set up your security questions if necessary. ...
  3. Step 3: Enable two-factor authentication. ...
  4. Step 4: Always sign out when not using your devices.
Oct 13, 2018

Does factory reset remove encryption? ›

The data on most Android phones is encrypted which means that it can't be accessed following a factory reset. As such, you don't need to worry about another person accessing this information if you sell your Android phone.

How do I unlock end-to-end encryption in messages? ›

Enable End-to-End Encryption in Messages
  1. Open the Messages app.
  2. Tap the three-dot menu.
  3. Select Settings.
  4. Select Chat features.
  5. Tap Enable chat features.
Jul 1, 2021

Is deleted iPhone data encrypted? ›

Once an item has been deleted, it is encrypted and it is gone for all practical purposes. It's not coming back. iOS encryption applies to deleted data on an iPhone. So within the forensics world, deleted photos, videos and call logs that have been deleted are deleted.

How do I bypass encrypted iPhone backup? ›

To turn off backup encryption, uncheck the "Encrypt local backup" checkbox in the Finder or iTunes and enter the password. If you can't remember your password, you have two options: If you have an iCloud account, you can use iCloud to back up and restore. Learn how to reset your backup password.

How do I know if my iPhone is encrypted? ›

To verify this, do the following:
  1. Go to Settings.
  2. Then navigate to Touch ID & Passcode.
  3. If your Passcode is turned on then scroll to the bottom. ...
  4. If your Passcode is turned off, then turning it on will automatically switch on encryption also known as Data Protection.
Apr 6, 2022

What happens if I delete all documents and data from iCloud? ›

What about Deleting Documents and Data on iCloud? You can delete Documents and Data directly from your iCloud account, however, this will only delete documents and data stored on your iCloud, and therefore won't free up space on your iPhone or iPad.

What happens if I delete everything from my iCloud? ›

Files you delete from iCloud Drive are recoverable for 30 days, but you can remove deleted files before the 30-day time period is up. See Recover deleted files on iCloud.com and Permanently remove deleted files on iCloud.com.

Is everything on iCloud encrypted? ›

All sessions at iCloud.com are encrypted in transit between Apple's servers and the browser on your device. When Advanced Data Protection is enabled, access to your data via iCloud.com is disabled by default.

Can iCloud still be hacked? ›

Conclusion. So, in short, can your iCloud account be hacked in 2022? The short answer to that question is yes, however, our research has shown that iCloud hacking is not possible in the same way it used to work. Spyware is unable to download a full backup of a victim's device from iCloud.

Can iCloud ever be hacked? ›

Like most Apple products, iCloud is known for being highly secure. Unfortunately, however, this doesn't mean that individual accounts cannot be hacked. In order to achieve this, all anybody really has to do is figure out your password. And if you're not careful, this isn't necessarily a difficult task.

Is it easy for iCloud to get hacked? ›

iCloud is Extremely Secure

“Data stored in the iCloud is encrypted so a hacker needs a key to access it. Meaning to say: this storage system is extremely secured.” With that said, this doesn't mean iCloud is 100 percent secure all of the time. Problems can arise because of the behavior of iPhone users.

Will factory resetting iPhone remove hackers? ›

Reset your phone

The majority of malware can be removed with a factory reset of your phone. This will, however, wipe any data stored on your device, such as photos, notes, and contacts, so it's important to back up this data before resetting your device.

Can police recover data from factory reset? ›

Yes, data can be recovered utilising a forensic data recovery process after a factory reset.

Can erased iPhone data be recovered? ›

You can restore content, settings, and apps from a backup to a new or newly erased iPhone. Important: You must first create a backup of your iPhone. See Back up iPhone.

How to tell if someone has used secret conversations on Messenger? ›

How to Tell if Someone Has Used Secret Conversations on Messenger? You cannot tell it directly because the secret conversation is end-to-end encrypted. However, you can use the AirDroid Parental Control app. You can access the Messenger of the target device from your device.

Can I find old text messages on iCloud? ›

You can retrieve deleted text messages on your iPhone with iOS 16 within one month of deletion. You can also use iCloud, iTunes, or Finder to recover texts if you saved backups to your computer. If all else fails, reach out to your mobile carrier — they may restore deleted messages for you.

How do I view my text messages on iCloud? ›

On your iPhone, iPad, or iPod touch, go to Settings > [your name] > iCloud. Do one of the following: iOS 16, iPadOS 16, or later: Tap Show All, tap Messages, then turn on Sync this [device]. iOS 15, iPadOS 15, or earlier: Turn on Messages.

Are my text messages backed up on iCloud? ›

When you set up iCloud for Messages, your messages are stored in the cloud instead of locally on your device. You can see them on any device that's set up for iCloud and Messages, including your iPhone, iPad, iPod touch, and Mac.

What happens if I don't Encrypt my iPhone backup? ›

Without an encrypted backup, iTunes (Apple) won't take the risk of restoring your iPhone's keychain data as a security precaution. For example, if someone stole your computer, they could restore your data to a different iPhone and have access to all your passwords.

Can encryption be bypassed? ›

No matter how high its level, encryption alone does not prevent hacking. If hackers can't bypass your encryption they will seek out other access points to your enterprise data.

How do I remove encryption from iPhone without password? ›

Summary
  1. Connect the iOS device to your computer using a USB cable.
  2. Launch iTunes (or Finder on macOS Catalina and higher).
  3. Select the device from the list and ensure the Summary tab is selected.
  4. Under the "Backups" header, uncheck the 'Encrypt Local Backup' Option.
Jan 18, 2021

Are all iPhone texts encrypted? ›

Messages, FaceTime, and Mail. Your iMessages and FaceTime conversations are encrypted end-to-end, so they can't be read while they're sent between devices. Mail lets you go incognito.

Are iPhones automatically encrypted? ›

Advanced Data Protection for iCloud

For years, Apple has offered industry-leading data security on its devices with Data Protection, the sophisticated file encryption system built into iPhone, iPad, and Mac. “Apple makes the most secure mobile devices on the market.

How can you tell if your data is being encrypted? ›

In the Data Protection window, click on the icon of the hard drive (aka System Storage). Under System Storage, if you see the following text: OSDisk (C) and In compliance underneath, then your hard drive is encrypted.

Does deleting photos delete from iCloud too? ›

For these reasons, the iCloud's memory is more permanent and preserved better than the memory on your iPhone, iPad, or Mac. However, the connectivity between iPhone and iCloud means that if you delete a picture on your iPhone, it's also scrubbed from iCloud.

Is it OK to delete old backups on iCloud? ›

When you delete iPhone backup, the data synced to iCloud.com won't be affected. In fact, it won't have any impact on what's actually on your device. I guess, most of you are concerned with photos. Well, photos on the iOS device are never only stored in the backup.

Does deleting photos clear iCloud storage? ›

iCloud Photos uses your iCloud storage to keep all of your photos and videos up to date across your devices. You can make more space in iCloud when you delete photos and videos that you no longer need from the Photos app on any of your devices.

Does deleting Apple ID delete iCloud data? ›

Once an Apple ID account is deleted, you'll lose access to a number of services and saved content. Below is a list of a few things that happen: You lose access to Apple services and App Store media purchases. Photos, videos, and documents stored in iCloud are permanently deleted.

Does erasing iPhone delete iCloud data? ›

Your content won't be deleted from iCloud when you erase your device.

Does erasing iPhone from iCloud delete everything? ›

No, it won't. Erasing your iPhone has only effect on the device itself. It's even possible to erase your iPhone without an internet connection; how would iCloud then know to erase the data as well? Save this answer.

Can someone spy on you through iCloud? ›

If you've given your iCloud password to someone in the past, they can use it to spy on you. There is also the chance your iCloud password has been hacked unbeknownst to you. And even if no one has your iCloud password, you may still be at risk of an iCloud security breach.

What are the risks of using iCloud? ›

While iCloud makes it "extremely easy" for users to keep and sync large amounts of personal data in the cloud, it can also expose data to numerous security risks including virus infections and wireless vulnerabilities, warned CoSoSys' founder and CEO, Roman Foeckl.

Can police see iCloud? ›

Cloud Data. There are many backups of data on your phone. Anything saved outside of your device can be accessed by law enforcement if they follow the correct and established legal routes to do so. If you back up an iPhone to Apple's iCloud, the government can request that information from Apple.

What happens when you reset encrypted? ›

By encrypting data at rest, you're essentially converting your customer's sensitive data into another form of data. This usually happens through an algorithm that can't be understood by a user who does not have an encryption key to decode it.

What happens when end-to-end encryption is off? ›

If that happens, you won't have a lock next to the timestamp of the conversation's latest message or on the send button when you compose a message. Learn how to control the way messages are sent when end-to-end encryption isn't available.

Can encrypted data be recovered? ›

There is even a common belief that encrypted data cannot be restored. But in fact, though encryption adds complexity to the recovery process, in most cases, it doesn't prevent it entirely.

Will I lose text messages if I reset my phone? ›

Certainly. Factory reset will reset your phone to factory settings. The result is that all the data will be erased from your device storage, which includes your Google account, system and app data, device settings, etc. Therefore, it's better to create backups at any time.

Does encryption actually delete files? ›

When you encrypt plain text files, Encrypting File System (EFS) makes a backup copy of the file. So the data isn't lost if an error occurs during the encryption process. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data isn't removed until it has been overwritten.

Does Apple encrypt deleted data? ›

Within an iPhone or iPad, files are stored via file based encryption, meaning that there are unique encryption keys for each file. When a file is deleted, the encryption key is removed, preventing the recovery of the encrypted file.

Is iCloud encrypted end to end? ›

Advanced Data Protection: Messages in iCloud is always end-to-end encrypted. When iCloud Backup is enabled, everything inside it is end-to-end encrypted, including the Messages in iCloud encryption key.

What is the major problem with end-to-end encryption? ›

Disadvantages of end-to-end encryption

The security that end-to-end privacy offers might be limited if a third party gets physical access to the device at either end of the transmission — not only can they read existing messages, but also send new ones.

Can end-to-end encryption be hacked? ›

End-to-end encrypted messages can't be altered or edited in any way. If a third party makes alterations, the receiver of the messages is notified.

Can hackers hack end-to-end encryption? ›

In an end-to-end encrypted system, the only people who can access the data are the sender and the intended recipient(s) – no one else. Neither hackers nor unwanted third parties can access the encrypted data on the server.

Can a hacker see encrypted data? ›

Encryption only protects whatever is encrypted, such as your internet connection, email, or files, but it does nothing to prevent you from other online threats. For example, a VPN might encrypt your internet connection, but your online accounts could still get hacked.

Can police access encrypted data? ›

If your phone is locked or you only use encrypted messaging apps, police can use mobile device forensic tools to break the encryption or bypass your lock screens if they are armed with a warrant.

Top Articles
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 6217

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.