Skip to content

Latest commit

 

History

History
45 lines (36 loc) · 4.02 KB

0x11-V6-Interaction_with_the_environment.md

File metadata and controls

45 lines (36 loc) · 4.02 KB

V6: Platform Interaction Requirements

Control Objective

The controls in this group ensure that the app uses platform APIs and standard components in a secure manner. Additionally, the controls cover communication between apps (IPC).

Security Verification Requirements

# MSTG-ID Description L1 L2
6.1 MSTG-PLATFORM-1 The app only requests the minimum set of permissions necessary. x x
6.2 MSTG-PLATFORM-2 All inputs from external sources and the user are validated and if necessary sanitized. This includes data received via the UI, IPC mechanisms such as intents, custom URLs, and network sources. x x
6.3 MSTG-PLATFORM-3 The app does not export sensitive functionality via custom URL schemes, unless these mechanisms are properly protected. x x
6.4 MSTG-PLATFORM-4 The app does not export sensitive functionality through IPC facilities, unless these mechanisms are properly protected. x x
6.5 MSTG-PLATFORM-5 JavaScript is disabled in WebViews unless explicitly required. x x
6.6 MSTG-PLATFORM-6 WebViews are configured to allow only the minimum set of protocol handlers required (ideally, only https is supported). Potentially dangerous handlers, such as file, tel and app-id, are disabled. x x
6.7 MSTG-PLATFORM-7 If native methods of the app are exposed to a WebView, verify that the WebView only renders JavaScript contained within the app package. x x
6.8 MSTG-PLATFORM-8 Object deserialization, if any, is implemented using safe serialization APIs. x x
6.9 MSTG-PLATFORM-9 The app protects itself against screen overlay attacks. (Android only) x
6.10 MSTG-PLATFORM-10 A WebView's cache, storage, and loaded resources (JavaScript, etc.) should be cleared before the WebView is destroyed. x
6.11 MSTG-PLATFORM-11 Verify that the app prevents usage of custom third-party keyboards whenever sensitive data is entered (iOS only). x

References

The OWASP Mobile Security Testing Guide provides detailed instructions for verifying the requirements listed in this section.

For more information, see also: