What are MITRE ATT&CK?
Catalogs a wide range of tactics and techniques observed during
real-world attacks
MITRE ATT&CK
Divides into categories/tactics such as
● Initial Access
● Execution
● Persistence
● Privilege Escalation
● Defense Evasion
What are the OWASP?
Open Web Application Security Project
What are the OWASP Top 10?
Identifies the ten most critical web application security risks
What are the Current OWASP Top 10?
■ Broken Access Control
■ Cryptographic Failures
■ Injection
■ Insecure Design
■ Security Misconfiguration
■ Vulnerable and Outdated Components
■ Identification and Authentication Failures
■ Software and Data Integrity Failures
■ Security Logging and Monitoring Failures
■ Server-Side Request Forgery
What are OWASP - Broken Access Control?
Occurs when restrictions on user actions are not properly enforced
Unauthorized access to functionality or data
What are OWASP - Cryptographic Failures?
Failures related to managing sensitive data securely, including improper encryption
Compromises data confidentiality and integrity
What are OWASP - Injection Flaws
Untrusted data sent to an interpreter as part of a command or
query, leading to unintended commands or unauthorized data
access
Execution of unintended commands or access to unauthorized data
What are MASVS?
OWASP Mobile Application Security Verification Standard
What are MASVS-STORAGE?
Secure storage of sensitive data (personal details, user credentials,
financial information)
Ensures data is protected through encryption and prevents data
leakage
Shields sensitive data from unauthorized access and breaches
What are MASVS-CRYPTO?
Cryptographic measures to protect sensitive data
Emphasizes using strong, industry-standard encryption methods
Ensures cryptographic keys are of sufficient length and managed
properly
What are MASVS-AUTH?
Covers authentication and authorization processes
Ensures strong mechanisms to verify user identities and grant appropriate
access rights
Uses secure protocols and additional authentication for sensitive
operations
What are MASVS-NETWORK?
Addresses security of network communications between the mobile app and remote endpoints
Protects data in transit against interception, tampering, and
eavesdropping
Uses protocols like SSL/TLS and certificate pinning
What kind of protocols uses MASVS-NETWORK?
SSL/TLS
What are MASVS-PLATFORM?
Secure interaction between the app and the underlying mobile
platform and other apps
Addresses issues like inter-process communication and WebViews
Ensures sensitive data isn’t leaked through platform mechanisms
What are MASVS-CODE?
Deals with secure development and maintenance of the app’s code
Emphasizes keeping the app and its operating system up to date
Treats all incoming data as untrusted, verifying and sanitizing it
What are MASVS-RESILIENCE?
App’s ability to withstand reverse engineering and tampering
efforts
Includes strategies for detecting and mitigating attempts to alter
the app’s code or behavior
What are MASVS-PRIVACY?
Emphasizes implementing privacy controls aligned with laws and
regulations
Apps should request only essential data and ensure informed user
consent
Data sharing with third parties should be necessary and based on user
consent
OWASP Mobile Application Security Testing Guide (MASTG) Provides:
a detailed testing framework for validating security controls
OWASP MAS Checklist Offers:
a practical format for assessing security features in the app
MASVS-STORAGE Ensures:
secure storage of user credentials through good encryption practices
MASVS-CRYPTO Uses:
industry-standard encryption to protect data both in transit
and at rest
MASVS-AUTH Implements:
strong user authentication mechanisms
MASVS-NETWORK Uses______ _______ protocols to secure data in transit
SSL/TLS