-
-
Notifications
You must be signed in to change notification settings - Fork 439
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
updating V7-Code_quality_and_build_setting_requirements.md #61
Conversation
@@ -9,13 +9,14 @@ The goal of this control is to ensure that basic security coding practices are f | |||
| # | Description | 1 | 2 | 3 | 4 | | |||
| --- | --- | --- | --- | --- | --- | | |||
| **7.1** | Verify that the application catches and handles possible exceptions.| ✓ | ✓ | ✓ | ✓ | | |||
| **7.2** | Verify that all debugging code is removed from the release build, and that the app does log detailed error messages. | ✓ | ✓ | ✓ | ✓ | | |||
| **7.2** | Verify that all debugging code is removed from the release build, and that the app does log detailed error messages. (e.g ADB logcat, NSLog)| ✓ | ✓ | ✓ | ✓ | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This requirement is missing a NOT:
Verify that all debugging code is removed from the release build, and that the app does NOT log detailed error messages.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think examples are not needed, as we want to stay consistent throughout the MASVS. If we put examples here we should have them everywhere. Details for this will be outlined in the MSTG (https://github.com/OWASP/owasp-mstg)
| **7.3** | Verify that error handling logic in security controls denies access by default. | ✓ | ✓ | ✓ | ✓ | | ||
| **7.4** | Do not concatenate untrusted external input into database queries or dynamically executed code. | ✓ | ✓ | ✓ | ✓ | | ||
| **7.5** | If the app contains unmanaged code, verify that memory is allocated, freed and used securely. | ✓ | ✓ | ✓ | ✓ | | ||
| **7.6** | Verify that the app is marked as a release build. | ✓ | ✓ | ✓ | ✓ | | ||
| **7.7** | Verify that security features offered by the compiler, such as stack protection, PIE support and automatic reference counting, are activated. | ✓ | ✓ | ✓ | ✓ | | ||
| **7.8** | Verify that static and dynamic application security testing are performed as part of the development lifecycle, and that the configuration of the SAST and DAST tools is tailored to the app. | | ✓ | ✓ | ✓ | | ||
| **7.9** | Verify that App must be code signed and provisioned with valid certificate. | | ✓ | ✓ | ✓ | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would say that this is a Level 1 requirement, as these are the fundamental security principles of iOS and Android that you can only install an App if it is signed correctly.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, of course!
updating V7-Code_quality_and_build_setting_requirements.md
No description provided.