logo

Database

OWASP MASVS

Last updated: 2024/01/18
logo

The OWASP Mobile Application Security Verification Standard (OWASP MASVS) is a standard for mobile app security. It is used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. The version used in this section is OWASP MASVS v2.0.

Control-Requirement Mapping

DefinitionRequirements
STORAGE-1. The app securely stores sensitive data
STORAGE-2. The app prevents leakage of sensitive data
CRYPTO-1. The app employs current strong cryptography and uses it according to industry best practices
CRYPTO-2. The app performs key management according to industry best practices
AUTH-1. The app uses secure authentication and authorization protocols and follows the relevant best practices
AUTH-2. The app performs local authentication securely according to the platform best practices
AUTH-3. The app secures sensitive operations with additional authentication
NETWORK-1. The app secures all network traffic according to the current best practices
NETWORK-2. The app performs identity pinning for all remote endpoints under the developer's control
PLATFORM-1. The app uses IPC mechanisms securely
PLATFORM-2. The app uses WebViews securely
PLATFORM-3. The app uses the user interface securely
CODE-1. The app requires an up-to-date platform version
CODE-2. The app has a mechanism for enforcing app updates
CODE-3. The app only uses software components without known vulnerabilities
CODE-4. The app validates and sanitizes all untrusted inputs
RESILIENCE-1. Cryptography requirementsThe app validates the integrity of the platform
RESILIENCE-2. The app implements anti-tampering mechanisms
PRIVACY-1. The app minimizes access to sensitive data and resources
PRIVACY-2. The app prevents identification of the user
PRIVACY-3. The app is transparent about data collection and usage
PRIVACY-4. The app offers user control over their data