Owasp Top 10 Mobile Risks
Owasp Top 10 Mobile Risks
Owasp Top 10 Mobile Risks
OWASP Foundation
September 19th, 2012
https://www.owasp.org
OWASP"
Top 10 Mobile Risks
Sven Vetsch
Leader OWASP Switzerland
Copyright The OWASP Foundation
Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.
Introduction
Sven Vetsch
Leader OWASP Switzerland
http://www.owasp.ch
Partner & CTO Redguard AG
http://www.redguard.ch
Focused on Application Security (Web,
Mobile, )
2
Agenda
Mobile Security Project
Mobile Threat Model
Top 10 Mobile Risks
Wrap Up
Q&A
3
Mobile Security Project
Started in Q3 2010
Threat Model
Risks
Why?
Controls
Training
Unique and different Dev. Guide
security risks
Secure Libraries
Tools
Goal
Methodologies
Cheat Sheets
To build security into
mobile dev. life cycle
4
Mobile Threat Model
Mobile Threat Model
Platforms vary heavily
Very different from traditional web app
model due to wildly varying use cases and
usage patterns
Must consider more than the Apps
Remote web services
Platform integration (iCloud, GCM)
Device (in)security considerations
6
Mobile Threat Model
7
Mobile Threat Model
8
Top 10 Mobile Risks
Top 10 Mobile Risks
Intended to be platform-agnostic
Focused on areas of risk rather than individual
vulnerabilities
Weighted utilizing the OWASP Risk Rating
Methodology
https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology
10
Top 10 Mobile Risks
Everything in this presentation is in a draft
state.
First final version is planned for around
February 2013
11
Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
Security Decisions"
M2
Weak Server Side Controls
M7
Via Untrusted Inputs
Insufficient Transport"
M3
M8
Side Channel Data Leakage
Layer Protection
12
M1- Insecure Data Storage
13
M1- Insecure Data Storage
14
M1- Insecure Data Storage"
Prevention Tips
15
M1- Insecure Data Storage"
Prevention Tips
European Network and Information Security Agency (ENISA)
Smartphones secure development guidelines for app
developers
Store ONLY what is absolutely Control
Description
required
1.1-1.14
Identify and protect sensitive
Never use public storage areas (ie- data on the mobile device
17
M2- Weak Server Side Controls
OWASP Top 10
OWASP Cloud Top 10
https://www.owasp.org/index.php/
Category:OWASP_Top_Ten_Project
https://www.owasp.org/images/4/47/Cloud-
Top10-Security-Risks.pdf
18
M2- Weak Server Side Controls"
Prevention Tips
20
M3- Insufficient Transport Layer Protection
21
M3- Insufficient Transport Layer Protection"
Prevention Tips
24
M4- Client Side Injection"
Prevention Tips
25
M5- Poor Authorization and Authentication
27
M5- Poor Authorization and Authentication"
Prevention Tips
MTAN)
Never use device ID or
subscriber ID as sole
authenticator
28
M6- Improper Session Handling
29
M6- Improper Session Handling"
Prevention Tips
lost/stolen device
Utilize high entropy, tested token
generation resources
30
M7- Security Decisions Via Untrusted Inputs
http://software-security.sans.org/blog/2010/11/08/insecure-handling-url-schemes-apples-ios/
32
M7- Security Decisions Via Untrusted Inputs"
Prevention Tips
Temp directories
35
M8- Side Channel Data Leakage"
Prevention Tips
36
M9- Broken Cryptography
37
M9- Broken Cryptography"
38
M9- Broken Cryptography"
Prevention Tips
39
M10- Sensitive Information Disclosure
40
M10- Sensitive Information Disclosure
41
M10- Sensitive Information Disclosure"
Prevention Tips
42
Wrap Up
Going Forward
12 month revision cycle
Rapidly evolving platforms
Stale data == not as useful
If you have suggestions or ideas, we want
to hear them!
44
Conclusion
This is a good start, but we have a long
way to go
Weve identified the issuesnow we have
to fix them
Platforms must mature, frameworks must
mature, apps must mature
The OWASP Mobile body of knowledge
must grow
45
Q&A
Thanks for listening!
Contact me:
[email protected]
Twitter: @disenchant_ch / @owasp_ch
46