P?tice doporu?ení k minimalizaci bezpe?nostních rizik mobilních aplikací
01.06.2012
Jeff Williams:
Set rules for those using applications on personal mobile devices to complete business transactions. For example, control what applications they can use and make sure the organization has the right to remotely wipe the device if it´s lost or stolen
Minimize the amount of sensitive data stored using mobile apps. If data must be stored on a mobile device, protect it in an encrypted container or ”sandbox“ with a strong access code
Lock down all interfaces to the server housing an organization´s mobile applications
Make sure developers get advanced training on how to write secure mobile applications
Have all mobile applications reviewed for security, including conducting penetration tests, before they go live