which existing mobile apps can be compared by developers and application owners PROCUREMENT To provide a baseline for mobile app security verification. GUIDANCE To provide guidance during all phases of mobile app development and testing. 3
testers are granted access to key resources such as architects and developers of the app, project documentation, source code, and authenticated access to endpoints, including access to at least one user account for each role 7/1/20XX Pitch deck title 4
in terms of code quality, handling of sensitive data, and interaction with the mobile environment MASVS-L2: Defense-in- Depth handle highly sensitive data MASVS-R: Resiliency Against Reverse Engineering and Tampering The app has state-of-the-art security, and is also resilient against specific, clearly defined client-side attacks, such as tampering, modding, or reverse engineering to extract sensitive code or data 7/1/20XX Pitch deck title 8
MASVS L1+R - Mobile apps where Intellectual Property (IP) protection is a business goal - Gaming Industry MASVS L2+R - Financial Industry: Online banking apps that allow the user to move funds, - All mobile apps that, by design, need to store sensitive data on the mobile device, and at the same time must support a wide range of devices and operating system versions. - Apps with in-app purchases if no server-side protection 9
Requirements Data Storage and Privacy Requirements Authentication and Session Management Requirements Platform Interaction Requirements Network Communication Requirements Resiliency Against Reverse Engineering Requirements Code Quality and Build Setting Requirements
category “V1” lists requirements pertaining to architecture and design of the app. As such, this is the only category that does not map to technical test cases in the OWASP Mobile Testing Guide
14 The protection of sensitive data, such as user credentials and private information, is a key focus in mobile security - Personally identifiable information - Highly sensitive data - Any data that must be protected by law or for compliance reasons
that the verified application uses cryptography according to industry best practices, including: • Use of proven cryptographic libraries; • Proper choice and configuration of cryptographic primitives; • A suitable random number generator wherever randomness is required.
title 19 to ensure that basic security coding practices are followed in developing the app, and that “free” security features offered by the compiler are activated