Breaking News

Mobile Security App-titude- Best Practices for Secure App Design and Data Privacy

Mobile app security can be very challenging

Mobile app security can be very challenging. It’s an attack surface that is often an easy entry point for hackers to gain access to sensitive information. After all, mobile devices are a treasure trove of data. We all use our mobile devices for almost everything – from our work to personal lives, and in turn, end up storing nearly everything on it. This in turn puts your app at risk for a serious breach. This also has the potential to negatively impact your company’s relationship with your clients as the expectation is that you will protect and respect their privacy.

Mobile app owners and developers are receiving a failing grade on due diligence to protecting consumer data. If you are nodding in approval to any (or all) of these, then read on:

  • Developers aren’t writing secure code because they are not taught so, nor do they think about how hackers can access and use the code/data they create.
  • Developers are not trained to adapt best of agile and security practices to address vulnerabilities before they become a problem.
  • Most organizations are struggling to balance agility and security and are not implementing security by design.
  • Security and development teams do not have access to the right automated tools and platforms that help to establish an effective cybersecurity program.
  • There is a lack of awareness and visibility into how the third-party apps are using, sharing or selling the data you collect.
  • Business leaders or app owners are not providing enough transparency on how they protect personal data nor are they providing guidelines on how to have more control over data usage.

As a result, it’s shouldn’t come as a surprise that mobile apps are performing poorly on protecting personal data. Insecure data storage is by far the most common vulnerability identified in the tested applications, with 76% of those examined found to demonstrate this as a security risk, potentially putting the privacy and security of users at risk. (Source: Vulnerabilities and Threats in Mobile Applications 2019 report from Positive Technologies)

Mobile Application Vulnerabilities

Mobile application vulnerabilities (percentage of client-side components)

Source: ptsecurity.com

Why PII Security Matters

Data breaches are becoming an everyday news and the ramifications of data breaches can be far reaching and can last for years. A substantial number of hacking attacks are through exploited application security vulnerabilities; cybercriminals often go after users’ personally identifiable information (PII), user credentials, financial and medical information to perform multiple types of frauds and identity theft.

Eduardo Cervantes, Manager Sentinel Mobile at WhiteHat Security says, “The impact of data abuse can be on individual level, business level or societal level. An individual could be a subject of identity theft, fraud, or a serious crime if a malicious threat actor lays hands on personal data that’s collected by your app. On a business level it could be competitive situation where one app leverages user data to gain an unfair advantage. Social impact can be immense and far reaching, take for example the Cambridge Analytica data scandal where the political firm accessed private data of millions of Facebook users to influence elections. It’s important to protect user data and be aware that your app could be contributing to a much larger problem if the stored data can be hacked, stolen or leaked.”

Collecting large datasets creates increased risks and most security teams and app developers are not aware of best practices on protecting PII and the implications of sensitive data sharing.

WhiteHat would like to offer you a couple of best practices that security engineers and development teams can follow to strengthen your application security and overall security posture (learn more in our upcoming webinar:

#1 BEST PRACTICE – Implement Security by Design

Most apps collect data that far exceeds what is necessary for the app. How does this indiscriminate collection of sensitive data increase the risk for your customers and business?

Use these best practices to reduce the risk to user data:

  • Collect data only what is required.
  • Collect in a responsible way. Know the difference between sensitive and non-sensitive data.
  • Secure the collection and storage of the data.
  • Evaluate how long you should retain this data.
  • Practice rigorous vetting of third-party providers to check on how they use the data that you collect.
  • And above all, educate developers on secure coding practices.

Security best practices must be developed even before planning the design and coding. How can you make your code less vulnerable? Test for vulnerabilities throughout the software development lifecycle. Implementing security by design and providing the right tools to your developers to vet the apps earlier in the software lifecycle helps prevent security gaps as the applications are designed, developed and tested.

As a security engineer, mobile app developer or mobile app business owner, you must take all steps to implement guidelines and best practices on collection, sharing and storage of sensitive data. The more the developers integrate security into the design, the safer applications can be pushed to production.

Learn more about the top 10 vulnerabilities in mobile applications.

#2 BEST PRACTICE – Security First; Compliance will Follow

Organizations that can’t handle the security of the sensitive data are bound to lose trust and that’s a huge risk to their business survival. Data compliance regulations and the penalties of non-compliance are making companies think more carefully about what sensitive data they collect, share and how they secure it.

With GDPR, CCPA, and other data protections laws are here to ensure industry-wide privacy regulations, companies need to be more aware of what data they keep and how it’s stored. App owners need to understand the data that they have on all of their users. And they must communicate to the user how the data is will be used, including third-party usage.

Checkbox compliance does not mean that you are holistically secure, but it is a beginning to ensure that you’re doing due diligence to protect sensitive data.

The National Institute of Standards and Technology (NIST) offers specific security focused guidance on how organizations can minimize their mobile app risks. Over the last few years, NIST has been updating their app-vetting recommendations to emphasize the need to have security and privacy built-in by design. NIST Privacy Framework provides recommendations and best practices on how organizations can ensure the security of mobile applications and address security weaknesses.

As a business owner, app developer or member of a security team, we can do better. Let’s practice what we preach to protect sensitive data, meet compliance and continue to invest in platforms and services that help secure applications, networks and devices. It’s time to take mobile security and data privacy seriously.

We continue this discussion at this upcoming webinar. Join us on a PII journey to gain a deeper understanding on why data privacy matters and why you should care about protecting user data. We’ll also share some best practices on data collection and mobile AppSec.

When: Feb 13th at 10:00 – 11:00am PST

Save your spot

(Register even if you can’t attend, the recording will be available to all registrants)

Tags: best practices mobile application security, Mobile Application Security, Mobile appsec webinar, PII, sensitive data collection