10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

1. Secure app development<br />

2. App store security<br />

Secure app development<br />

ENISA has drafted, toge<strong>the</strong>r with <strong>the</strong> Open Web Application <strong>Security</strong> Project (OWASP)<br />

mobile security project, security guideline for app developers 96 .<br />

Written in 2011, <strong>the</strong> guidelines have been written for developers <strong>of</strong> <strong>Smartphone</strong> apps as a<br />

guide to developing secure mobile apps.<br />

It <strong>of</strong>fers practical advice on securing mobile apps with ten control mechanisms:<br />

1. Identify and protect sensitive data on <strong>the</strong> mobile device.<br />

2. Handle password credentials securely on <strong>the</strong> device.<br />

3. Ensure sensitive data is protected in transit.<br />

4. Implement user au<strong>the</strong>ntication and authorisation (including session management).<br />

5. Securing backend APIs (services) and <strong>the</strong> platform (server) secure.<br />

6. Secure data integration with third party services and applications.<br />

7. Pay specific attention to <strong>the</strong> collection and storage <strong>of</strong> consent for collection and use<br />

<strong>of</strong> user’s data.<br />

8. Implement controls to prevent unauthorised access to paid-for resources (wallet,<br />

SMS, phone calls etc.).<br />

9. Ensure <strong>the</strong> secure distribution and provisioning <strong>of</strong> mobile apps.<br />

10. Checking for runtime interpretation <strong>of</strong> code for errors.<br />

App store security – Mobile malware<br />

ENISA <strong>of</strong>fers advice against <strong>the</strong> threat <strong>of</strong> mobile malware in a report published in September<br />

2011 entitled “Appstore security – 5 lines <strong>of</strong> defence against malware”. 97<br />

In <strong>the</strong> report ENISA identifies <strong>the</strong>se five lines <strong>of</strong> defence against mobile malware:<br />

1. App review: App stores should review apps before admitting <strong>the</strong>m to <strong>the</strong> app store.<br />

2. Reputation mechanism: App stores should show <strong>the</strong> reputation <strong>of</strong> apps and app<br />

developers.<br />

3. App revocation (aka kill-switch): <strong>Smartphone</strong> platforms should support remote<br />

removal <strong>of</strong> installed apps by app stores.<br />

4. Device security: Includes supporting sandboxes to install and run apps “to reduce <strong>the</strong><br />

impact <strong>of</strong> malware”.<br />

96 <strong>Smartphone</strong> Secure Development Guidelines, ENISA, 25 November 2011:<br />

http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/smartphone-security-<br />

1/smartphone-secure-development-guidelines<br />

97 Appstore security – 5 lines <strong>of</strong> defence against malware, ENISA, 12 September 2011:<br />

http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/smartphone-security-<br />

1/appstore-security-5-lines-<strong>of</strong>-defence-against-malware<br />

Goode Intelligence © 2013 P a g e | 102 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!