OWASP Annotated Application Security Verification Standard
latest

Browse by chapter:

  • v1 Architecture, design and threat modelling
  • v2 Authentication verification requirements
  • v3 Session management verification requirements
  • v4 Access control verification requirements
  • v5 Malicious input handling verification requirements
  • v6 Output encoding / escaping
  • v7 Cryptography at rest verification requirements
  • v8 Error handling and logging verification requirements
  • v9 Data protection verification requirements
  • v10 Communications security verification requirements
  • v11 HTTP security configuration verification requirements
  • v12 Security configuration verification requirements
  • v13 Malicious controls verification requirements
  • v14 Internal security verification requirements
  • v15 Business logic verification requirements
  • v16 Files and resources verification requirements
  • v17 Mobile verification requirements
    • 17.1 App verifies SSL certificates
    • 17.2 App does not use UDID values as security controls
    • 17.3 App protects sensitive data
    • 17.4 App does not use SQLite for sensitive data
    • 17.5 App does not have Secret credentials hard-coded in executable
    • 17.6 App protects against auto-snapshot information leakage
    • 17.7 App cannot be run on a jailbroken or rooted device
    • 17.8 App session timeout is of a reasonable value
    • 17.9 App requires appropriate permissions and resources
    • 17.10 App crash log does not contain sensitive data
    • 17.11 App binary has been obfuscated
  • v18 Web services verification requirements
  • v19 Configuration

Browse by level:

  • Level 1: Opportunistic
  • Level 2: Standard
  • Level 3: Advanced
OWASP Annotated Application Security Verification Standard
  • Docs »
  • v17 Mobile verification requirements
  • Edit on GitHub

v17 Mobile verification requirementsΒΆ

  • 17.1 App verifies SSL certificates
  • 17.2 App does not use UDID values as security controls
  • 17.3 App protects sensitive data
  • 17.4 App does not use SQLite for sensitive data
  • 17.5 App does not have Secret credentials hard-coded in executable
  • 17.6 App protects against auto-snapshot information leakage
  • 17.7 App cannot be run on a jailbroken or rooted device
  • 17.8 App session timeout is of a reasonable value
  • 17.9 App requires appropriate permissions and resources
  • 17.10 App crash log does not contain sensitive data
  • 17.11 App binary has been obfuscated
Next Previous

© Copyright 2015, Boy Baukema. Revision 471fcb0a.

Built with Sphinx using a theme provided by Read the Docs.
Read the Docs v: latest
Versions
latest
Downloads
pdf
htmlzip
epub
On Read the Docs
Project Home
Builds

Free document hosting provided by Read the Docs.