Mobile devices at the workplace: this so-called trend is here to stay. In response, IT teams are recognizing their responsibility to develop a secure and high-performance operating environment for their mobile and remote workforce.
Mobile-related security risks have increased to astronomical levels in the last year:
All that to say: a true organizational security posture cannot ignore the mobile apps and devices that its employees and customers use.
In this article, let’s review the practice of mobile application security testing, understand the motivation behind it and discuss the best practices for mobile application security testing.
An important part of any cybersecurity strategy is to test mobile applications that access, process and store sensitive business information on the device.
A modern business may rely on several mobile applications and web services to conduct daily business operations — anything from communications and collaboration to data analytics, planning, and execution.
(Related reading: application security & software testing.)
Mobile Application Security Testing refers to the holistic assessment and analysis procedure of testing mobile applications for vulnerabilities. Employing a mix of static, dynamic and interactive testing strategies, along with various security scenarios (black-box, white-box and gray-box testing environments), you can develop an accurate security posture of your mobile applications.
Importantly, the testing process is not limited to the security performance of the product itself — the security testing should also include the architectural design and SDLC frameworks used to push new features to the application.
For instance, a secure mobile application bakes security capabilities early during the SDLC pipeline, and engages in continuous, shift-left testing to identify security flaws early during the SDLC lifecycle.
(Understand how vulnerabilities & threats contribute to your overall risk.)
The application developers and organizations deploying mobile apps test for application security in the following ways:
Using these techniques, mobile app vendors and enterprises deploying mobile apps for business use can analyze security performance on the following key threat challenges and issues:
With mobile apps, the first thing people consider is where the data resides, and how to safely and securely transfer the data. Importantly, more laws are being made to mandate certain actions here, depending on your industry, your geography and possibly other factors.
To evaluate the data storage and transfer safety and security, you’ll want to evaluate the application security for three types of data:
(Learn more about third party risk management.)
The next security challenge to consider is how access privileges and permissions are controlled as the application handles user requests.
The application must be capable of enforcing the permission controls and access policies established by the organization that uses the app. Multi-factor authentication (MFA) and/or biometrics can be used to improve security performance.
(Related reading: identity and access management & access control models.)
Network communication is the next area to consider. Evaluate how the application responds to various network protocols used to access the data and backend data centers.
The data must be transmitted using secure HTTPS protocols and through private networks (corporate VPNs), especially when users access the services remotely.
As the application interacts with third-party services, evaluate the interfacing against parameter tampering, authentication bypass and vulnerabilities such as remote code execution.
To ensure that all data transmission is secure, encrypted and not susceptible to misconfigurations and vulnerabilities at the network layer, you’ll need to assess both:
(Related reading: API threats, API security testing & API monitoring.)
Because data processing is typically handled via the internet, your mobile app must also manage secure and robust web sessions. Testing the mobile application for session-related vulnerabilities includes generating session tokens and verifying if they are handled by the app using secure protocols such as HTTPS.
Consider implementing controls — session timeout, fixation, invalidation, and revocation — to limit the scope of a legitimate web session allowed the app will allow.
Access control, privilege escalation controls, error handling and information disclosure is evaluated by testing for misconfigurations, which may be common for organizations deploying the app for a large user base with varied levels of access privileges.
Mobile application security testing for misconfiguration-related vulnerabilities evaluate:
Since the application service may involve several third-party integrations, it is important to evaluate the risk exposure to the corresponding external dependencies. The mobile application security testing may involve dependency scanning and vulnerability assessments for these integrations.
By employing a mix of static, dynamic and interactive testing strategies, for a variety of security scenarios such as black-box, white-box and gray-box testing environments, you can develop an accurate security posture for your mobile applications.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.