Penetration TestJan Kahmen8 min read

The OWASP Mobile Security Testing Guide

Since the OWASP Testing Guide deals with mobile security, the question - What is mobile security anyway? arises.

What Is OWASP?

OWASP stands for Open Web Application Security Project and is best known for its OWASP Testing Guide. This guide provides a practical framework for the processes, techniques, and tools used in mobile app security testing. It presents proven measures that help you strengthen the security of your sensitive enterprise data.

What Is Mobile Security?

Since the OWASP Testing Guide focuses on mobile security, the question arises: what exactly does mobile security mean? The term encompasses a range of procedures designed to keep your applications secure. This security matters not only within your organization but also on mobile devices that access sensitive information on the go. Methods such as penetration testing follow the guidelines set out in the OWASP Testing Guide. The following areas are always assessed:

  • Inappropriate data storage, communications, and platform usage
  • Insecure authentication, authorization, and communication
  • Potential for manipulation within the source code
  • Reverse engineering
  • Inadequate cryptography and data storage

These tests can be performed on virtually any device and for a wide range of apps: from native apps to mobile web apps and hybrid solutions.

How Mobile Security Works

Mobile security becomes a critical concern once your organization supports the use of apps. Mobile app pentests and real-world experience show that smartphones and tablets are often inadequately secured, creating significant security risks. A successful attack can lead to financial losses and reputational damage. To prevent this, the OWASP Testing Guide provides a central set of guidelines that help you minimize your attack surface.

Mobile security does not have to be complicated. The foundation consists of technical solutions that protect your mobile systems from the outset. The OWASP Testing Guide offers these approaches along with the understanding of which tests matter at which stage. One effective way to strengthen mobile security is through container apps, for example. Rather than securing the device itself, they protect the corporate data stored on it. This approach not only simplifies the work for your IT department but also serves as a standalone solution with numerous benefits.

The Vision of the OWASP Mobile Security Testing Guide

The OWASP Testing Guide aims to define an industry standard for mobile application security. To achieve this, it is designed as a comprehensive testing guide that covers processes, techniques, and the necessary tools. With a large number of test cases, it enables consistent and complete results aligned with established security standards.

This Is What the OWASP Mobile Security Testing Guide Covers

The OWASP Testing Guide covers a range of topics related to security testing and mobile security, including mobile app security testing and advanced aspects such as reverse engineering. This makes it a valuable resource for developers building mobile applications on iOS and Android. The guide addresses the following areas:

  • Internal expertise on mobile platforms
  • Key security tests for mobile apps throughout their development lifecycle
  • Fundamental dynamic and static security testing
  • Manipulation and reverse engineering of mobile apps
  • Software protection assessments
  • Detailed test cases aligned with MASVS requirements

The OWASP Testing Guide is an essential resource for increasing the security of your mobile apps. It supports a wide range of professionals in their daily work, from software architects building secure applications to security testers who need complete and consistent results.

Given its broad audience, the OWASP Testing Guide is available in multiple languages, including German, English, French, Russian, Spanish, and Chinese.

Additionally, the guide provides a comprehensive checklist based on the MASVS and the MSTG. MSTG test cases are also included to help you achieve more effective security testing.

Comment on the Mobile Security Testing Guide on GitHub

The OWASP Testing Guide is available online as a GitBook. You can find it on GitHub, where you can comment on existing recommendations and contribute your own suggestions. Although the guide primarily targets iOS and Android app developers, non-programmers can also get involved and help improve OWASP security.

This Is How the OWASP Mobile Security Verification Standard Is Composed

To determine the right steps, you first need to define your app's protection requirements. Three levels are available to extend and strengthen your overall security approach:

  • R: Resistance to reverse engineering and tampering (protection against app modification)
  • L2: Defense-in-Depth (for example, two-factor authentication)
  • L1: Standard security (for example, network traffic)

Based on these levels, the OWASP Testing Guide defines the security requirements and provides foundational guidelines.

Prerequisites for Using Mobile App Security

To use the OWASP Testing Guide for your web security, you will need the associated checklist. It allows you to systematically verify MASVS requirements. You can also link OWASP Security with the MSTG test cases, which simplifies your mobile penetration testing process.

Beyond the checklist, targeted training in mobile security is highly recommended. The Mobile Security Testing Guide provides standalone learning resources that cover both foundational knowledge and advanced reverse engineering techniques.

These Versions of the OWASP Testing Guide Are Available

The OWASP Testing Guide is available in several versions. The following releases can currently be found on GitHub:

  • Release 1.2 with updates to MASVS and MSTG
  • Release 1.3 for Android Q and iOS 13
  • Release 1.4 as a major release

Who Is the OWASP Mobile Security Testing Guide For?

If web security matters to you, the OWASP Testing Guide is a valuable resource. It provides the essential tools you need to process sensitive data securely within your apps. Whether you develop these apps yourself or rely on existing software is secondary. What matters is recognizing that mobile security is a topic you should never neglect.