{"id":81514,"date":"2022-07-06T10:41:10","date_gmt":"2022-07-06T02:41:10","guid":{"rendered":"https:\/\/www.i-sprint.com\/?p=81514"},"modified":"2022-08-03T15:55:36","modified_gmt":"2022-08-03T07:55:36","slug":"best-practices-for-strengthening-mobile-app-security","status":"publish","type":"post","link":"https:\/\/www.i-sprint.com\/ja\/best-practices-for-strengthening-mobile-app-security\/","title":{"rendered":"Best Practices for Strengthening Mobile App Security"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"747\" height=\"549\" alt=\"Best Practices for Mobile App Security\" title=\"Best Practices for Mobile App Security\" src=\"https:\/\/www.i-sprint.com\/wp-content\/uploads\/2022\/04\/Best-Practices-for-Mobile-App-Security.jpg\" class=\"img-responsive wp-image-81755\" srcset=\"https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/04\/Best-Practices-for-Mobile-App-Security-200x147.jpg 200w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/04\/Best-Practices-for-Mobile-App-Security-400x294.jpg 400w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/04\/Best-Practices-for-Mobile-App-Security-600x441.jpg 600w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/04\/Best-Practices-for-Mobile-App-Security.jpg 747w\" sizes=\"(max-width: 800px) 100vw, 747px\" loading=\"lazy\" \/><\/span><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:15px;margin-bottom:15px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p><span style=\"font-weight: 400;\">In today\u2019s app economy, mobile apps contribute heavily to economic activity. In 2020 alone, Android\u2019s Play Store and Apple\u2019s App Store generated a combined <a href=\"https:\/\/actonline.org\/wp-content\/uploads\/2020-App-economy-Report.pdf\">$50.1 billion of revenue<\/a>\u2014and that was just in the United States. Developers get tasked with coding these apps and providing the features demanded by consumers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a competitive landscape, development teams focus their priorities on user experience, solving problems that improve the daily lives of users, and innovating apps with new features. Often, security plays the role of an afterthought to these primary concerns.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recognizing that developers might neglect security in favor of other priorities, malicious threat actors regularly target security weaknesses in an attempt to exfiltrate data, take over mobile devices, or even infiltrate networks through backend servers. Mobile app security needs to become a central priority in the modern cyber threat landscape. This article covers some fundamental best practices for developers to strengthen mobile app security and mitigate against common cyber attacks. <\/span><\/p>\n<h2><strong>Mobile App Security Best Practices<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">You could write a book on how to best secure mobile applications. From user authentication to APIs, to server vulnerabilities, there is a lot to cover. However, nailing down some fundamental best practices goes a long way toward dramatically increasing the security of mobile apps for developers.\u00a0<\/span><\/p>\n<p><strong>Implement Stronger User Authentication<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Relying on passwords alone to authenticate users is an outdated approach that makes apps and user accounts vulnerable to breaches. Many developers restrict their efforts at strengthening authentication to make it mandatory for users to create strong passwords.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are now more than 15 billion stolen credentials available to threat actors on the dark web from previous data breaches. Therefore, reliance on just passwords to authenticate is risky given that all it takes is one user reusing the same credentials in your app from a previous breach.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Stronger access control in mobile apps needs to include other categories of evidence for verifying user identities. Based on the sensitivity of application data and reputational risk of the brand offering the app, seek out an authentication server solution that offers support for multiple ways of implementing two-factor authentication and password protection. For the password itself, it is good to implement end-to-end encryption in addition to SSL for protection in transit as well as at rest. For two-factor authentication, instead of asking for a one-time password which may be a push factor for user experience, consider implementing mobile tokens which allow push-based logins combined with phone-based biometrics. While looking for an authentication server, it is important to choose one that does not lock you into a specific vendor or technology for the authentication mechanism.<\/span><\/p>\n<p><strong>Secure the Software Supply Chain<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Mobile apps depend on a combination of proprietary code and third-party components. These third-party components include frameworks and libraries that save time for developers with ready-made app functionality and behaviors, such as handling network requests or loading images.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The third-party components used to build mobile apps form a software supply chain that requires securing. Developers need to exercise due diligence in the libraries and frameworks they select for their mobile apps. Look for reputable open-source projects that are well-maintained. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, make sure to regularly update any libraries or frameworks that your mobile apps depend on. Serious vulnerabilities can emerge even in reputable third-party components as was evidenced during the Apache <\/span><a href=\"https:\/\/www.theguardian.com\/technology\/2021\/dec\/10\/software-flaw-most-critical-vulnerability-log-4-shell\"><span style=\"font-weight: 400;\">Log4j<\/span><\/a><span style=\"font-weight: 400;\"> incident in 2022.<\/span><\/p>\n<p><strong>Encrypt Data<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">As users interact with mobile apps, they regularly create data that gets stored locally on their devices or traverses the Internet to backend systems. Furthermore, important development data, which includes APIs, certificates, and authentication tokens, is also stored on mobile devices. Encryption is a pillar of modern app security because it protects this data by converting it into an unreadable format that threat actors can\u2019t use in any meaningful way.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Strong encryption standards, such as AES-256, are almost impossible to break with brute force. It\u2019s essential to protect both states of data in mobile apps:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data at rest which is stored in the sandboxes used on mobile devices to isolate different apps from each other\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data in transit over the network between the user\u2019s device and backend servers<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For data at rest, get a solution in place that encrypts files, binaries, strings, secrets, and runtime information generated in mobile apps. For data in transit, use TLS\/SSL to encrypt data along with public key infrastructure for trust.\u00a0<\/span><\/p>\n<p><strong>Handle Sessions Securely<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">In a world of shortened attention spans, users often jump between multiple mobile apps within a short timeframe. To avoid frustrating users, developers allow for lengthy sessions before requiring users to log back in again. These sessions are maintained through tokens, which pose risks when their timeout period is too long or when they\u2019re unintentionally shared.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the most sensitive apps, such as online banking, improper session management can wreak havoc on security. To better handle sessions, set session timeouts to one hour for low-security applications and 15 minutes for high-risk apps. Additionally, use standard Web access management aka Web SSO products that support industry-standard methods to create tokens and make sure sessions are effectively destroyed during authentication changes.\u00a0<\/span><\/p>\n<p><strong>Exercise the Principle of Least Privilege<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The principle of least privilege (PoLP) has a wide range of uses in information security. Exercising this principle means restricting access rights for users, accounts, and processes to only what\u2019s strictly necessary. For mobile app developers, applying PoLP is useful in limiting the permissions needed on user devices to run the application.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When an app requests more permissions than needed for it to run, the attack surface for malicious actors widens, and sensitive user data is unnecessarily put at extra risk. By applying PoLP to user permissions, developers can approach permissions with a more security-aware mindset that verifies whether there is genuine justification for requesting a given permission before coding that into the application.\u00a0<\/span><\/p>\n<p><strong>Change the Testing Approach<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The DevSecOps movement attempts to ensure app security becomes a priority early on in the development lifecycle. This type of cultural change is not easy to achieve, though. A good way to start is by changing your testing approach to a continuous one rather than periodic tests. Use threat modeling and automated tests to continuously look for new vulnerabilities that might be unknowingly putting your app and its users at risk of a successful cyber attack.\u00a0<\/span><\/p>\n<p><strong>Use an App Shielding Solution<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">An application shielding solution can prove extremely valuable in protecting mobile apps from real-time attacks. Apps that are secured well but run in unsecured environments, such as on jailbroken devices or outdated operating systems, are susceptible to compromise. An app shielding solution can isolate your app from the runtime environment and protect against threats that seek to exploit these risky conditions. Such solutions are also known as Runtime Application Self Protection (RASP) solutions. They are relatively easy to implement and offload the work of the developer to a product to handle the security aspect; hence they are highly popular and in fact are the de-facto baseline for certain industries like government and banking apps.<\/span><\/p>\n<h3><b>Closing Thoughts<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As a developer, it\u2019s critical to start adopting the mindset that security is as important as other concerns, such as innovation and user experience. Begin applying these best practices and you\u2019ll see noticeable improvements in the security of any mobile app you\u2019re tasked with working on.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At i-Sprint, we have solutions that can help developers strengthen mobile app security, implement strong authentication and session management. AccessMatrix IAM suite and YESsafe AppProtect+ provides application shielding while a range of best-in-class IAM solutions add extra security to user authentication.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.i-sprint.com\/contactus\/\"><span style=\"font-weight: 400;\">Contact us today<\/span><\/a><span style=\"font-weight: 400;\"> for more information.\u00a0<\/span><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Recognizing that developers might neglect security in favor of other priorities, malicious threat actors regularly target security weaknesses in an attempt to exfiltrate data, take over mobile devices, or even infiltrate networks through backend servers. Mobile app security needs to become a central priority in the modern cyber threat landscape. <\/p>\n","protected":false},"author":141,"featured_media":81755,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[174],"tags":[],"class_list":["post-81514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ja-2"],"_links":{"self":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/comments?post=81514"}],"version-history":[{"count":4,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81514\/revisions"}],"predecessor-version":[{"id":81758,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81514\/revisions\/81758"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media\/81755"}],"wp:attachment":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media?parent=81514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/categories?post=81514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/tags?post=81514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}