The iPhone and iPad received the status of the first consumer devices allowed access to NATO's classified information
Apple – the first consumer gadget manufacturer approved for NATO secret networks
Apple announced that iPhone and iPad are now the first “consumer” devices to receive official clearance to operate in closed NATO infrastructures. This means a standard iPhone with iOS 26 can connect to the alliance’s restricted data without installing specialized security software or modifying hardware.
> “This confirms that Apple has changed its traditional approach to security,” said Ivan Krstich, Vice President of Security Design and Architecture. “Previously protected devices were only available to governments and large corporations after costly investments. Now Apple has created the most reliable gadgets for all users, and their protection is uniquely certified in accordance with NATO requirements.”
How certification was achieved
To get a device through such a level of scrutiny, it’s not enough just to release a secure OS; it’s a long process with continuous monitoring.
- Previously iPhone and iPad were authorized to handle secret German government data thanks to built‑in security mechanisms in iOS and iPadOS.
- This result was confirmed by the German Federal Office for Information Security (BSI) after a comprehensive assessment, technical studies, and deep analysis.
Based on BSI approval, Apple has now officially certified iPhone and iPad running iOS 26 / iPadOS 26 for use in all NATO countries. The devices are also included in the alliance’s Information Security Product Catalog.
Key BSI arguments
Claudia Plattner, BSI President, emphasized the importance of “secure digital transformation” from the very start of mobile product development:
> “Security must be built into device design. After thorough testing of iOS and iPadOS platforms by BSI, we confirm their compliance with NATO member states’ requirements.”
Thus Apple has proven that its modern gadgets possess critical security features sufficient for operation in the alliance’s closed information environments.
Comments (0)
Share your thoughts — please be polite and stay on topic.
Log in to comment