This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Mobile Security Testing Guide"

From OWASP
Jump to: navigation, search
m (Fix link)
Line 124: Line 124:
 
Work will be split between working groups based on mobile OS and topic. On top of completing the content, we want to apply a basic level of proof-reading, review and editing to get the guide beta-ready.
 
Work will be split between working groups based on mobile OS and topic. On top of completing the content, we want to apply a basic level of proof-reading, review and editing to get the guide beta-ready.
  
In order to be able to schedule work during the summit and create work groups we need to know who will be attending the OWASP Summit and how much time you can/will spend for the mobile workshop. Please [add yourself to the list of participants https://github.com/OWASP/owasp-summit-2017/blob/master/Working-Sessions/Mobile-Security/MSTG.md] and reach out directly to Sven via Slack.
+
In order to be able to schedule work during the summit and create work groups we need to know who will be attending the OWASP Summit and how much time you can/will spend for the mobile workshop. Please [https://github.com/OWASP/owasp-summit-2017/blob/master/Working-Sessions/Mobile-Security/MSTG.md add yourself to the list of participants] and reach out directly to Sven via Slack.
  
 
If you do not have time during the summit but are interested to help, you can start immediately by assigning issues to yourself and creating pull requests. We can also loop you in remotely during the submit.
 
If you do not have time during the summit but are interested to help, you can start immediately by assigning issues to yourself and creating pull requests. We can also loop you in remotely during the submit.

Revision as of 05:58, 14 May 2017

OWASP MSTG Header.jpg

Our Vision

"Define the industry standard for mobile application security."

We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.

Main Deliverables

Mstg-mini-2.jpg Mobile Security Testing Guide

A comprehensive guide for iOS and Android mobile security testers with the following content:

  1. Mobile platform internals
  2. Testing in the secure development lifecycle
  3. Basic white-box and black-box security testing
  4. Mobile reverse engineering and tampering
  5. Assessing software protections
  6. Detailed white-box and black-box test cases that map to the requirements in the MASVS.

The MSTG is a work-in-progress. Currently, we hope to be "feature-complete" in Q3 2017. You can contribute and comment in the GitHub Repo. A book version of the current master branch is available on Gitbook.

Masvs-sample-mini.jpg Mobile App Security Requirements and Verification

The OWASP Mobile Application Security Verification Standard (MASVS) is a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The latest release is version 0.9.3.

Checklist.jpg Mobile App Security Checklist

A checklist for use in security assessments. Also contains links to the MSTG test case for each requirement. The current release is version 0.9.3.


Classifications

Owasp-breakers-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg

Project Leaders

Bernhard Mueller

Sven Schleier

Road Map

  • Q3 2017: Beta release
  • Q4 2017: Version 1.0
  • Q1 2018: Produce A Printable Book

Parent Project

OWASP_Mobile_Security_Project

Licensing

The guide is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.