This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Mobile Security Project"

From OWASP
Jump to: navigation, search
(OWASP Mobile Security Project)
Line 1,551: Line 1,551:
 
Ritesh Taank
 
Ritesh Taank
  
= MDM Technology =
 
==What is MDM Technology? - Author: Milan Singh Thakur==
 
MDM is a way to ensure employees stay productive and do not breach corporate policies. Many organizations control activities of their employees using MDM products/services.
 
MDM primarily deals with corporate data segregation, securing emails, securing corporate documents on device, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories.
 
There are two major types of MDM implementations:
 
    1. On-premise Solution
 
    2. Cloud-based Solution
 
For the organizations where security is highest concern, it preferred to have On-premise solution. This is always suggested for mission critical secure applications.
 
Cloud-based solution provides ease of access for the administrator.
 
 
==How does it provide Security?==
 
All MDM products are built with an idea of Containerization. The MDM Container is secured using latest crypto techniques (AES-256 or more preferred). All the corporate data like email, documents, enterprise application are encrypted and processed inside the container. This ensures that corporate data is separated from user’s personal data on the device.
 
Additionally, encryption for entire device and/or SD Card can also be enforced depending on MDM product capability.
 
 
'''Secure Email:'''
 
MDM products allow organization to integrate their existing email setup to be easily integrated with MDM environment. Almost all MDM products support easy integration with Exchange Server (2003/2007/2010), Office365, Lotus Notes, Blackberry Enterprise Server (BES) and others. This provided flexibility of configuring Email-over-air.
 
 
'''Secure Docs:'''
 
It is frequently seen that, employees copy attachments downloaded from corporate email to their personal devices and then misuse it. MDM can easily restrict/disable clipboard usage in/out of Secure Container; forwarding attachments to external domains can be restricted, downloading/saving attachments on SD Card. This ensures corporate data is not left insecure.
 
 
'''Secure Browser:'''
 
Using secure browser can avoid many potential security risks. Every MDM solution comes with built-in custom browser. Administrator can disable native browsers to force user to use Secure Browser, which is also inside the MDM container. URL filtering can be enforced to add additional productivity measure.
 
 
'''Secure App Catalogue:'''
 
Organization can distribute, manage, and upgrade applications on employee’s device using App Catalogue. It allows applications to be pushed on user device directly from the App Store or push an enterprise developed private application through the App Catalogue. This provides an option for the organization to deploy devices in Kiosk Mode or Lock-Down Mode.
 
 
 
==Additional MDM Features:==
 
There are plenty of other features depending on which MDM product being chosen. Below is the list for it:
 
 
• Policy Enforcing: There are multiple types of policies which can be enforced on MDM users.
 
    1. Persona Policy: According to corporate environment, highly customizable
 
    2. Device Platform specific: policies for advanced management of Android, IOS, Windows and Blackberry devices.
 
    3. Compliance Policies/Rules
 
 
• VPN configuration
 
 
• Application Catalogue
 
 
• Pre-defined Wi-Fi and Hotspot settings
 
 
• Jail-break/Root detection
 
 
• Remote Wipe of corporate data
 
 
• Remote Wipe of entire device
 
 
• Device remote locking
 
 
• Remote messaging/buzz
 
 
• Disabling native apps on device
 
 
•Logging, monitoring and reporting
 
 
•Centralized functionality
 
 
•Malware protection
 
 
•Endpoint Integrity Checking
 
 
•Role-based access rules
 
 
•Ease of deployment
 
 
•Configuration controls
 
 
•Flexible configuration to support different requirements and parameters
 
 
•Harmonization across mobile platform types
 
 
•Integration with other Endpoint Management Systems
 
 
==More light on MDM-MAM-MEM:==
 
'''Mobile Device Management (MDM)''' is like adding an extra layer of security and ensuring a way to monitor device related activities. MDM provides device platform specific features like device encryption, platform specific policies, SD Card encryption. Geo-location tracking, connectivity profiles (VPN, Wi-Fi, Bluetooth) and plenty other features are part of MDM Suite.
 
 
'''Mobile Application Management (MAM)''' is done by application wrapping i.e. injection arbitrary encryption code in the mobile application source. This is necessary for commercial applications or applications being developed in-house for Enterprise use. Additionally, white-listing/black-listing of application can be done. Features like Application Catalogue allow admin to push applications remotely to the devices for instant install, push remote updates and also remote removal of apps.
 
 
'''Mobile Email Management (MEM)''' ensures your corporate emails are containerized using advanced proprietary/free encryption algorithms. MEM ensures all emails remain inside the secure container, so that attackers get encrypted data even if they try to compromise the device data using USB cable on a system. Heavy restrictions on clipboard, attachments and trusted domains can be enforced. Nothing can move in-out of the secure container as clipboard is disabled. Even the attachments are downloaded and saved inside the secure container. To view the attachments there is secure document reader as well as secure document editor available in MDM solutions. Adding trusted domains will ensure that data from corporate email is not leaked to malicious/suspicious domains.
 
 
 
'''Top MDM Vendors in Market:'''
 
 
• AirWatch by VMware
 
 
• Amtel MDM
 
 
• BlackBerry BES10
 
 
• CA Technologies MDM
 
 
• Citrix XenMobile
 
 
• Dell EMM
 
 
• Good Technology MDM
 
 
• IBM MaaS360 MDM
 
 
• McAfee EMM
 
 
• Microsoft Enterprise Mobility Suite (EMS)
 
 
• MobileIron EMM
 
 
• SAP Afaria MDM
 
 
• SOTI MobiControl MDM
 
 
• Symantec Mobile Management
 
 
==For More Technical Details and Queries==
 
 
'''Author: Milan Singh Thakur'''
 
 
Contact: ''milanthakur2010@gmail.com''
 
 
Linkedin: Connect Professionally[https://in.linkedin.com/in/milansinghthakur]
 
  
 
=Guide Development Project=
 
=Guide Development Project=
Line 1,674: Line 1,556:
 
[[File:OWASP_Mobile_Guide_Logo_Milan.PNG]]
 
[[File:OWASP_Mobile_Guide_Logo_Milan.PNG]]
  
'''Project initiated by: ''Jonathan Carter and Milan Singh Thakur'''''
+
'''Project initiated by: ''Milan Singh Thakur'''
 +
'''Co-Leaders: Bernhard and Sven'''
  
 
For more details on this project please check below links:
 
For more details on this project please check below links:

Revision as of 11:00, 3 November 2016

Lab big.jpg

OWASP Mobile Security Project

OWASP Mobile Logo Milan.PNG


**New** Download OWASP Mobile Apps Checklist 2016 here

**New** Mobile Top Ten 2016 - Candidate Release

Click here to goto Mobile Security Page Archive

The OWASP Mobile Apps Checklist is highly focused on security checks for your mobile apps. If you are a Pentester or an organization which develops mobile apps, then this checklist is what you should consider as BaseLine for your mobile apps.

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, our goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.

Our primary focus is at the application layer. While we take into consideration the underlying mobile platform and carrier inherent risks when threat modeling and building controls, we are targeting the areas that the average developer can make a difference. Additionally, we focus not only on the mobile applications deployed to end user devices, but also on the broader server-side infrastructure which the mobile apps communicate with. We focus heavily on the integration between the mobile application, remote authentication services, and cloud platform-specific features.


We have a Google Doc where anyone who wants to be involved with the project can add their thoughts, suggestions, and take ownership of initiatives - Click here. There are various tasks that people have started over the past 6 months with varying levels of quality and completeness.

This project is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads or feel free to visit the mailing list as well!

Email List

Asvs-bulb.jpg Project Email List

Project Leaders

Jonathan Carter @
Milan Singh Thakur @

Co-Leaders

Bernhard Mueller @
Sven Schleier @

Former Leaders

Mike Zusman @
Tony DeLaGrange @
Sarath Geethakumar @
Tom Eston @
Don Williams
Jason Haddix @

Top Contributors

Zach Lanier @
Ludovic Petit @
Swapnil Deshmukh @
Beau Woods @
David Martin Aaron @
Luca De Fulgentis @
Andrew Pannell @
Stephanie V @