Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

updating V7-Code_quality_and_build_setting_requirements.md #61

Merged
merged 2 commits into from
Dec 15, 2016

Conversation

kryptoknight13
Copy link

No description provided.

@@ -9,13 +9,14 @@ The goal of this control is to ensure that basic security coding practices are f
| # | Description | 1 | 2 | 3 | 4 |
| --- | --- | --- | --- | --- | --- |
| **7.1** | Verify that the application catches and handles possible exceptions.| ✓ | ✓ | ✓ | ✓ |
| **7.2** | Verify that all debugging code is removed from the release build, and that the app does log detailed error messages. | ✓ | ✓ | ✓ | ✓ |
| **7.2** | Verify that all debugging code is removed from the release build, and that the app does log detailed error messages. (e.g ADB logcat, NSLog)| ✓ | ✓ | ✓ | ✓ |
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This requirement is missing a NOT:

Verify that all debugging code is removed from the release build, and that the app does NOT log detailed error messages.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think examples are not needed, as we want to stay consistent throughout the MASVS. If we put examples here we should have them everywhere. Details for this will be outlined in the MSTG (https://github.com/OWASP/owasp-mstg)

| **7.3** | Verify that error handling logic in security controls denies access by default. | ✓ | ✓ | ✓ | ✓ |
| **7.4** | Do not concatenate untrusted external input into database queries or dynamically executed code. | ✓ | ✓ | ✓ | ✓ |
| **7.5** | If the app contains unmanaged code, verify that memory is allocated, freed and used securely. | ✓ | ✓ | ✓ | ✓ |
| **7.6** | Verify that the app is marked as a release build. | ✓ | ✓ | ✓ | ✓ |
| **7.7** | Verify that security features offered by the compiler, such as stack protection, PIE support and automatic reference counting, are activated. | ✓ | ✓ | ✓ | ✓ |
| **7.8** | Verify that static and dynamic application security testing are performed as part of the development lifecycle, and that the configuration of the SAST and DAST tools is tailored to the app. | | ✓ | ✓ | ✓ |
| **7.9** | Verify that App must be code signed and provisioned with valid certificate. | | ✓ | ✓ | ✓ |
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would say that this is a Level 1 requirement, as these are the fundamental security principles of iOS and Android that you can only install an App if it is signed correctly.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, of course!

@sushi2k sushi2k merged commit 0fb0828 into OWASP:master Dec 15, 2016
commjoen pushed a commit that referenced this pull request Jun 4, 2019
updating V7-Code_quality_and_build_setting_requirements.md
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants