[ISM] Mobile Application Security (OWASP):

The Open Worldwide Application Security Project (OWASP) Mobile Application Security Verification Standard is used in the development of mobile applications.

[OWASP] Use secure cryptography for data protection (SSS-02-04-02)

Use robust cryptographic algorithms and secure key management practices to protect sensitive data within the mobile app. This includes using approved encryption methods to prevent unauthorized access or decryption of sensitive data stored on the device.

[OWASP] Ensure robust cryptographic protection and secure key management (SSS-02-04-02-01 )

Implement strong cryptographic standards to ensure that the application utilizes strong, industry-approved cryptographic algorithms to protect sensitive data, adhering to best practices to counter threats such as physical attacks or unauthorized data access. Cryptographic methods must be continuously updated to remain aligned with evolving security standards. Secure key management practices. Cryptographic keys must be managed securely throughout their lifecycle, including generation, storage, usage, and protection. Poor key management can nullify strong encryption; therefore, best practices such as key rotation, secure storage, and access restrictions must be enforced to mitigate risks and maintain data security integrity.

Operations

ID Operation Description Phase Agent
SSS-02-04-02-01-01 Implement strong cryptography for sensitive data Use current, industry-approved cryptographic algorithms to encrypt sensitive data stored on the device or transmitted over networks. Development Development teams, Security team
SSS-02-04-02-01-02 Follow secure key management practices Generate, store, and protect cryptographic keys using secure methods, such as hardware-backed storage or secure enclaves, and ensure proper key lifecycle management. Development Development teams, Security team
SSS-02-04-02-01-03 Regularly audit cryptographic implementations Periodically review the app’s cryptographic functionality and key management processes to ensure compliance with industry standards and detect weaknesses. Development Security team, QA team
SSS-02-04-02-01-04 Enforce proper cryptographic error handling Implement error-handling mechanisms for cryptographic operations to avoid unintended behavior, such as plaintext exposure when encryption fails. Deployment Security team, IT operations

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1922)
The Open Worldwide Application Security Project (MASVS-CRYPTO)
The Open Worldwide Application Security Project (MASVS-CRYPTO)