This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Mobile Security Project"

From OWASP
Jump to: navigation, search
m (OWASP Mobile Security Project)
m (OWASP Mobile Security Project)
Line 10: Line 10:
 
[https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Guide_Development_Project New*- Mobile AppSec Guide Development Project]
 
[https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Guide_Development_Project New*- Mobile AppSec Guide Development Project]
  
'''OWASP Mobile Apps Checklist Coming soon'''
+
'''[https://drive.google.com/file/d/0BxOPagp1jPHWQjVxV3RaZ1k1WTg/view?usp=sharing New** Download OWASP Mobile Apps Checklist]'''
  
 
The OWASP Mobile Apps Checklist is highly focused on security checks for your mobile apps. If you are a Pentester or an organization which develops mobile apps, then this checklist is what you should consider as BaseLine for your mobile apps.
 
The OWASP Mobile Apps Checklist is highly focused on security checks for your mobile apps. If you are a Pentester or an organization which develops mobile apps, then this checklist is what you should consider as BaseLine for your mobile apps.

Revision as of 09:15, 18 November 2015

Lab big.jpg

OWASP Mobile Security Project

OWASP Mobile Logo Milan.PNG

New*- Mobile AppSec Guide Development Project

New** Download OWASP Mobile Apps Checklist

The OWASP Mobile Apps Checklist is highly focused on security checks for your mobile apps. If you are a Pentester or an organization which develops mobile apps, then this checklist is what you should consider as BaseLine for your mobile apps.

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, our goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.

Our primary focus is at the application layer. While we take into consideration the underlying mobile platform and carrier inherent risks when threat modeling and building controls, we are targeting the areas that the average developer can make a difference. Additionally, we focus not only on the mobile applications deployed to end user devices, but also on the broader server-side infrastructure which the mobile apps communicate with. We focus heavily on the integration between the mobile application, remote authentication services, and cloud platform-specific features.


We have a Google Doc where anyone who wants to be involved with the project can add their thoughts, suggestions, and take ownership of initiatives - Click here. There are various tasks that people have started over the past 6 months with varying levels of quality and completeness.

This project is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads or feel free to visit the mailing list as well!

Email List

Asvs-bulb.jpg Project Email List

Project Leaders

Jonathan Carter @
Mike Zusman @
Tony DeLaGrange @
Sarath Geethakumar @
Tom Eston @
Don Williams
Jason Haddix @
Milan Singh Thakur @

Top Contributors

Zach Lanier @
Jim Manico @
Ludovic Petit @
Swapnil Deshmukh @
Beau Woods @
Jonathan Carter @
David Martin Aaron @
Luca De Fulgentis @
Andrew Pannell @