Security features for 24-inch iMac
Your 24-inch iMac with M1 chip provides the following security features to protect what’s on your computer and prevent unauthorized software apps from loading during startup:
Secure storage: Your storage drive is encrypted with hardware keys to provide advanced levels of security. In the event of a catastrophic failure, data recovery may not be possible, so you need to back up your files to an external source. See Use macOS Recovery on a Mac with Apple silicon in the macOS User Guide.
You can set up Time Machine or another backup plan to regularly back up your files. See Back up your files with Time Machine in the macOS User Guide and the Apple Support article Back up your Mac with Time Machine.
Secure boot and Startup Security Utility: Support for secure boot is turned on automatically. It’s designed to verify that the operating system software loaded on your computer at startup is authorized by Apple.
If your iMac doesn’t start up because it detects an untrusted component, it will start up from a secure recovery partition and automatically correct issues if possible. To learn more about the Startup Security Utility or to find out how to set other options, see the Apple Support article About Startup Security Utility.
System integrity: The M1 chip in your 24-inch iMac verifies that the version of macOS software loaded during startup is authorized by Apple, and continues behind the scenes to protect the authorizations established for macOS. This makes it harder for malware or malicious websites to exploit your iMac.
Data Protection: In addition to the default storage drive encryption in the iMac, third-party app developers can use file-level encryption to better protect sensitive data, without impacting system performance.
Note: In rare circumstances, such as a power failure during a macOS upgrade, your iMac may become unresponsive and the firmware on the chip may need to be revived. See Revive or restore a Mac with Apple silicon with Apple Configurator 2 in the Apple Configurator 2 User Guide.
Learn more. See the Apple Platform Security User Guide.