This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Mobile Security Project"

From OWASP
Jump to: navigation, search
(Added the MASVS)
(restructure of the leaders/contributors to make way for more informative pages.)
Line 24: Line 24:
 
[[Image:Asvs-bulb.jpg]] [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks Project Email List]
 
[[Image:Asvs-bulb.jpg]] [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks Project Email List]
  
 +
= Top 10 Mobile Risks =
 +
 +
Please visit the [https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks project page] for current information.
 +
 +
== About this list  ==
 +
In 2015, we performed a survey and initiated a Call for Data submission Globally . This helped us to analyze and re-categorize the OWASP Mobile Top Ten for 2016. So the top ten categories are now more focused on Mobile application rather than Server.
 +
 +
Our goals for the 2016 list included the following:
 +
 +
* Updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc;
 +
* Generation of more data; and
 +
* A PDF release.
 +
 +
This list has been finalized after a 90-day feedback period from the community. Based on feedback, we have released a Mobile Top Ten 2016 list following a similar approach of collecting data, grouping the data in logical and consistent ways.
 +
 +
Feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well!
 +
 +
== Top 10 Mobile Risks - Final List 2016 ==
 +
*[[Mobile_Top_10_2016-M1-Improper_Platform_Usage|M1: Improper Platform Usage ]]
 +
*[[Mobile_Top_10_2016-M2-Insecure_Data_Storage|M2: Insecure Data Storage ]]
 +
*[[Mobile_Top_10_2016-M3-Insecure_Communication|M3: Insecure Communication ]]
 +
*[[Mobile_Top_10_2016-M4-Insecure_Authentication|M4: Insecure Authentication ]]
 +
*[[Mobile_Top_10_2016-M5-Insufficient_Cryptography|M5: Insufficient Cryptography ]]
 +
*[[Mobile_Top_10_2016-M6-Insecure_Authorization|M6: Insecure Authorization ]]
 +
*[[Mobile_Top_10_2016-M7-Poor_Code_Quality|M7: Client Code Quality ]]
 +
*[[Mobile_Top_10_2016-M8-Code_Tampering|M8: Code Tampering ]]
 +
*[[Mobile_Top_10_2016-M9-Reverse_Engineering|M9: Reverse Engineering ]]
 +
*[[Mobile_Top_10_2016-M10-Extraneous_Functionality|M10: Extraneous Functionality ]]
 +
 +
== Top 10 Mobile Risks - Final List 2014 ==
 +
[[File:2014-01-26 20-23-29.png|right|550px]]
 +
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]]
 +
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]
 +
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]
 +
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]
 +
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]
 +
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]
 +
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]
 +
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]
 +
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]
 +
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]
 +
 +
== Project Methodology ==
 +
 +
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''
 +
 +
== Archive ==
 +
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks.  This list was initially released on September 23, 2011 at Appsec USA.  
 +
** The original presentation can be found here:&nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]<br>
 +
** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]
 +
** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]
 +
 +
=Mobile Security Checklist =
 +
 +
The checklist is hosted on the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide#tab=Main OWASP MSTG project page].
 +
 +
=Mobile Application Security Verification Standard =
 +
 +
The standard is hosted on the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide#tab=Main OWASP MSTG project page].
 +
 +
=Mobile Security Testing Guide=
 +
 +
The OWASP Mobile Security Testing Guide is now a separate project - check the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide#tab=Main OWASP MSTG project page] for details.
 +
 +
=Acknowledgements=
 +
 +
The OWASP Mobile Security project has a long history. It has been a source for many projects their predecessors as is clearly visible in the archive.
 
== Project Leaders ==
 
== Project Leaders ==
 
{{Template:Contact
 
{{Template:Contact
Line 105: Line 172:
 
}}<br/>
 
}}<br/>
 
|}
 
|}
 
= Top 10 Mobile Risks =
 
 
Please visit the [https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks project page] for current information.
 
 
== About this list  ==
 
In 2015, we performed a survey and initiated a Call for Data submission Globally . This helped us to analyze and re-categorize the OWASP Mobile Top Ten for 2016. So the top ten categories are now more focused on Mobile application rather than Server.
 
 
Our goals for the 2016 list included the following:
 
 
* Updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc;
 
* Generation of more data; and
 
* A PDF release.
 
 
This list has been finalized after a 90-day feedback period from the community. Based on feedback, we have released a Mobile Top Ten 2016 list following a similar approach of collecting data, grouping the data in logical and consistent ways.
 
 
Feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well!
 
 
== Top 10 Mobile Risks - Final List 2016 ==
 
*[[Mobile_Top_10_2016-M1-Improper_Platform_Usage|M1: Improper Platform Usage ]]
 
*[[Mobile_Top_10_2016-M2-Insecure_Data_Storage|M2: Insecure Data Storage ]]
 
*[[Mobile_Top_10_2016-M3-Insecure_Communication|M3: Insecure Communication ]]
 
*[[Mobile_Top_10_2016-M4-Insecure_Authentication|M4: Insecure Authentication ]]
 
*[[Mobile_Top_10_2016-M5-Insufficient_Cryptography|M5: Insufficient Cryptography ]]
 
*[[Mobile_Top_10_2016-M6-Insecure_Authorization|M6: Insecure Authorization ]]
 
*[[Mobile_Top_10_2016-M7-Poor_Code_Quality|M7: Client Code Quality ]]
 
*[[Mobile_Top_10_2016-M8-Code_Tampering|M8: Code Tampering ]]
 
*[[Mobile_Top_10_2016-M9-Reverse_Engineering|M9: Reverse Engineering ]]
 
*[[Mobile_Top_10_2016-M10-Extraneous_Functionality|M10: Extraneous Functionality ]]
 
 
== Top 10 Mobile Risks - Final List 2014 ==
 
[[File:2014-01-26 20-23-29.png|right|550px]]
 
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]]
 
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]
 
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]
 
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]
 
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]
 
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]
 
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]
 
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]
 
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]
 
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]
 
 
== Project Methodology ==
 
 
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''
 
 
== Archive ==
 
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &nbsp;This list was initially released on September 23, 2011 at Appsec USA. &nbsp;
 
** The original presentation can be found here:&nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]<br>
 
** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]
 
** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]
 
 
=Mobile Security Checklist =
 
 
The checklist is hosted on the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide#tab=Main OWASP MSTG project page].
 
 
=Mobile Application Security Verification Standard =
 
 
The standard is hosted on the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide#tab=Main OWASP MSTG project page].
 
 
=Mobile Security Testing Guide=
 
 
The OWASP Mobile Security Testing Guide is now a separate project - check the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide#tab=Main OWASP MSTG project page] for details.
 
  
 
= M-Tools =
 
= M-Tools =

Revision as of 12:02, 8 July 2019

Lab big.jpg

OWASP Mobile Security Project

OWASP Mobile Logo Milan.PNG

**New** Mobile Top Ten 2016 - Final Release

Click here to goto Mobile Security Page Archive

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, our goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.

Our primary focus is at the application layer. While we take into consideration the underlying mobile platform and carrier inherent risks when threat modeling and building controls, we are targeting the areas that the average developer can make a difference. Additionally, we focus not only on the mobile applications deployed to end user devices, but also on the broader server-side infrastructure which the mobile apps communicate with. We focus heavily on the integration between the mobile application, remote authentication services, and cloud platform-specific features.

This project is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads or feel free to visit the mailing list as well!

Email List

Asvs-bulb.jpg Project Email List