Secure Communication

Iniziamo. È gratuito!
o registrati con il tuo indirizzo email
Secure Communication da Mind Map: Secure Communication

1. Open Web Application Security Project (OWASP)

1.1. Mobile Application Security Verification Standard (MASVS)

1.1.1. 1.2 MSTG-ARCH-2

1.1.2. 5.1 MSTG-NETWORK-1

1.1.3. 5.3 MSTG-NETWORK-3

1.1.4. 5.4 MSTG-NETWORK-4

1.1.5. 5.5 MSTG-NETWORK-5

1.1.6. 6.2 MSTG-PLATFORM-2

1.1.7. 6.3 MSTG-PLATFORM-3

1.1.8. 6.4 MSTG-PLATFORM-4

1.1.9. 6.7 MSTG-PLATFORM-7

1.1.10. 8.13 MSTG-RESILIENCE-13

1.2. Application Security Verification Standard 4.0.3 (ASVS)

1.2.1. V1.5 Input and Output Architecture

1.2.2. V1.7 Errors, Logging and Auditing Architecture

1.2.3. V1.9 Communications Architecture

1.2.4. V1.14 Configuration Architecture

1.2.5. V2.2 General Authenticator Security

1.2.6. V3.5 Token-based Session Management

1.2.7. V8.3 Sensitive Private Data

1.2.8. V9.2 Server Communication Security

2. GOOGLE

2.1. Core app quality

2.1.1. SC-N2

2.1.2. SC-N3

2.2. App Security Best Practices

2.2.1. Enforce secure communication

2.2.2. Enforce secure communication Use implicit intents and non-exported content providers

2.2.3. Enforce secure communication Apply network security measures

2.2.4. Enforce secure communication Use HTML message channels

3. UK National Cyber Security Centre (NCSC)

3.1. Application development Recommendations

3.1.1. Secure data handling Secure data transmission

3.1.2. Android application development 1.2 Network protection

3.1.3. Android application development 1.3 Secure application development Secure data transmission

3.1.4. Secure iOS application development 1.2 Network protection

3.1.5. Secure Windows application development 1.2 Network protection

3.1.6. Secure Windows application development 1.6 Secure data transmission

3.1.7. Secure Windows application development 1.8 General security recommendations

4. European Telecommunications Standards Institute (ETSI)

4.1. ETSI TS 103 732

4.1.1. 8.1.7 Trusted Path/Channels (FTP)

5. US National Institute of Standards and Technology (NIST)

5.1. NIST Special Publication 800-190

5.1.1. 4.2.1 Insecure connections to registries

5.1.2. 4.3.3 Poorly separated inter-container network traffic

5.1.3. 4.3.5 Orchestrator node trust

5.1.4. 4.4.2 Unbounded network access from containers

6. National Information Assurance Partnership (NIAP)

6.1. Requirements for Vetting Mobile Apps from the Protection Profile for Application Software

6.1.1. Network Communications FDP_NET_EXT.1.1

6.1.2. Protection of Data in Transit FTP_DIT_EXT.1.1

6.1.3. HTTPS ProtocolFCS_HTTPS_EXT.1.1

6.1.4. HTTPS Protocol FCS_HTTPS_EXT.1.1

6.1.5. HTTPS Protocol FCS_HTTPS_EXT.1.3