The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
Don't roll your own storage encryption, use platform provided APIs EncryptedFile/EncryptedSharedPreferences. (Android)
iOS KeyChain DataProtection classes (iOS)
envelope encryption (DEK+KEK) or equivalent (iOS)
sensitive data must not encoded (e.g. base64, simple bit operations such as XOR or bit flipping) instead of encrypted
MASTG v1 Refactoring:
If the risk has a MASVS v1 ID, you can use it to search for related tests in the MASTG and use them as input to define your risks and associated tests.
Hi @thomascannon, I think this PR was automatically closed because the target branch doesn't exist anymore. Sorry about that. Could you please reopen it targeting master? Thank you!
Description
Create a new risk for "Sensitive Data Stored Unencrypted in Private Storage Locations (MASVS-STORAGE-1)" using the following information:
Sensitive data may be stored in internal locations without encryption and may be accessible to other apps under certain conditions.
Create "
risks/MASVS-STORAGE/1-***-****/data-unencrypted-private-storage/risk.md
" including the following content:To complete the sections follow the guidelines from Writing MASTG Risks & Tests
When creating the corresponding tests, use the following areas to guide you:
MASTG v1 Refactoring:
If the risk has a MASVS v1 ID, you can use it to search for related tests in the MASTG and use them as input to define your risks and associated tests.
Acceptance Criteria
risks/MASVS-STORAGE/1-***-****/data-unencrypted-private-storage/risk.md
)