Date Published: April 2019
Supersedes:
SP 800-163 (01/26/2015)
Author(s)
Michael Ogata (NIST), Joshua Franklin (NIST), Jeffrey Voas (NIST), Vincent Sritapan (DHS), Stephen Quirolgico (DHS)
Mobile applications have become an integral part of our everyday personal and professional lives. As both public and private organizations rely more on mobile applications, securing these mobile applications from vulnerabilities and defects becomes more important. This paper outlines and details a mobile application vetting process. This process can be used to ensure that mobile applications conform to an organization’s security requirements and are reasonably free from vulnerabilities.
Mobile applications have become an integral part of our everyday personal and professional lives. As both public and private organizations rely more on mobile applications, securing these mobile applications from vulnerabilities and defects becomes more important. This paper outlines and details a...
See full abstract
Mobile applications have become an integral part of our everyday personal and professional lives. As both public and private organizations rely more on mobile applications, securing these mobile applications from vulnerabilities and defects becomes more important. This paper outlines and details a mobile application vetting process. This process can be used to ensure that mobile applications conform to an organization’s security requirements and are reasonably free from vulnerabilities.
Hide full abstract
Keywords
app vetting; app vetting system; malware; mobile applications; mobile security; niap; security requirements; software assurance; software vulnerabilities; software testing
Control Families
Planning; Risk Assessment; System and Communications Protection