SlideShare a Scribd company logo
The Ultimate Security
Checklist Before Launching
Your Android App
Enterprise Grade Mobile Security
Use the Android Application Sandbox, which
isolates your app data and code execution
from other apps.
1.
Enterprise Grade Mobile Security
Use an encrypted filesystem that can be
enabled to protect data on lost or stolen
devices.
2.
Enterprise Grade Mobile Security
Ensure that the registration and activation
process is robust.
3.
Enterprise Grade Mobile Security
Minimize the number of permissions that
your app requests.
4.
Enterprise Grade Mobile Security
Have application-defined permissions
to control application data on a per-
app basis.
5.
Enterprise Grade Mobile Security
Have user-granted permissions to restrict
access to system features and user data.
6.
Enterprise Grade Mobile Security
Do not store sensitive information on external
storage, such as SD Cards. These are globally
readable and writable.
7.
Enterprise Grade Mobile Security
Apply caution using network transactions
because it involves transmitting data that is
potentially private to the user.
8.
Enterprise Grade Mobile Security
Perform strong input validations. Insufficient
input validation is a common security problem
affecting applications, regardless of the platform
they run on.
9.
Enterprise Grade Mobile Security
Native code that gets received over the network
or from an IPC is vulnerable to threat. You can
prevent it by careful handling pointers &
managing buffers.
10.
Enterprise Grade Mobile Security
If you are using data within queries that are
submitted to an SQL database or a content
provider, SQL injection may be an issue. The
best defense is to use parameterized queries.
11.
Enterprise Grade Mobile Security
Apply caution in using WebView because it
consumes web content like HTML & JavaScript -
improper use leads to web security issues such
as cross-site-scripting (JavaScript injection).
12.
Enterprise Grade Mobile Security
Minimize the frequency of asking for user
credentials—it makes phishing attacks more
conspicuous, and less likely to be successful.
Instead use an authorization token and refresh it.
13.
Enterprise Grade Mobile Security
Android provides algorithms for protecting data
using cryptography such as supporting full-
filesystem encryption & providing secure
communication channels.
14.
Enterprise Grade Mobile Security
A few apps implement IPC using traditional
Linux techniques such as network sockets and
shared files. Use Android system functionality
for IPC such as Intent, Binder or Messenger with
a Service, and BroadcastReceiver.
15.
Enterprise Grade Mobile Security
Intents are the preferred mechanism for
asynchronous IPC in Android. Depending on
your application requirements, you might use
sendBroadcast(), sendOrderedBroadcast(), or an
explicit intent to a specific application
component.
16.
Enterprise Grade Mobile Security
Using Binder or Messenger is the preferred
mechanism for RPC-style IPC in Android. They
provide a well-defined interface that enables
mutual authentication of the endpoints, if
required.
17.
Enterprise Grade Mobile Security
Do not load code from outside of your
application APK. It significantly increases the
likelihood of application compromise due to
code injection or code tampering.
18.
Enterprise Grade Mobile Security
Maintain security of the backend APIs (services)
and the platform (server).
19.
Enterprise Grade Mobile Security
Ensure secure distribution and provisioning of
mobile applications.
20.
Enterprise Grade Mobile Security
Use encrypted communications between clients
and servers through properly configured SSL.
21.
Enterprise Grade Mobile Security
CONCLUSION
Here you go with the 21 most essential checks
that you should perform before launching your
Android App. Even if you already have, it would
be a good revisit.
Enterprise Grade Mobile Security
REGISTER FOR A
FREE SECURITY SCAN
Appknox helps you unlock the security issues in
your mobile app & suggests immediate action!
Register Now!
Enterprise Grade Mobile Security

More Related Content

PDF
OWASP Mobile Top 10 Deep-Dive
PPTX
Zero Trust Cybersecurity for Microsoft Azure Cloud
PDF
Mobile App Hacking In A Nutshell
PDF
Point-Of-Sale Hacking - 2600Thailand#20
PDF
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
PDF
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
PDF
Jump-Start The MASVS
PPTX
Seminar-Two Factor Authentication
OWASP Mobile Top 10 Deep-Dive
Zero Trust Cybersecurity for Microsoft Azure Cloud
Mobile App Hacking In A Nutshell
Point-Of-Sale Hacking - 2600Thailand#20
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
Jump-Start The MASVS
Seminar-Two Factor Authentication

What's hot (20)

PPTX
Next-generation Zero Trust Cybersecurity for the Space Age
PDF
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
PPTX
Security Testing
PDF
Solution: Block Armour Secure Remote Access for WFH
PDF
Block Armour Case Study
PDF
Top5 protectiondomains infographic_final
PDF
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
PDF
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
PDF
Symantec Code Signing (CH)
PDF
IoT Hardware Teardown, Security Testing & Control Design
PDF
Symantec Code Sign (NAM)
PPT
How BYOD Will Shape Wireless Network Security in 2012
PDF
Smartphones' Security
PPTX
Two Factor Authentication
PPTX
Multifactor Authentication
PPTX
Mobile Security Research Projects Help
PPT
Security as as Service: Case Study of F-Secure
PDF
Symantec Code Signing (UK)
PDF
Mobile Defense-in-Dev (Depth)
PPTX
Web application firewall
Next-generation Zero Trust Cybersecurity for the Space Age
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Security Testing
Solution: Block Armour Secure Remote Access for WFH
Block Armour Case Study
Top5 protectiondomains infographic_final
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Symantec Code Signing (CH)
IoT Hardware Teardown, Security Testing & Control Design
Symantec Code Sign (NAM)
How BYOD Will Shape Wireless Network Security in 2012
Smartphones' Security
Two Factor Authentication
Multifactor Authentication
Mobile Security Research Projects Help
Security as as Service: Case Study of F-Secure
Symantec Code Signing (UK)
Mobile Defense-in-Dev (Depth)
Web application firewall
Ad

Similar to The Ultimate Security Checklist Before Launching Your Android App (20)

ODP
Dos and Don'ts of Android Application Security (Security Professional Perspec...
PDF
Top Practices You Need To Develop Secure Mobile Apps.
PPT
Mobile application security Guidelines
PPTX
Mobile App Security: Enterprise Checklist
PPTX
Android App Development - Factors to be Considered Before Outsourcing
PDF
Introduction to Android Application Security Testing - 2nd Sep 2017
PPTX
Android Security
PDF
How to Build Secure Mobile Apps.pdf
PDF
Mobile Banking Security: Challenges, Solutions
PDF
Secure Enterprise App Development_ Best Practices.pdf
PPTX
Android security
PPT
Outsmarting smartphones
PDF
Challenges in Testing Mobile App Security
PDF
DroidCon 2015 - Building Secure Android Apps For The Enterprise
PPT
Analysis and research of system security based on android
PDF
Android App Hacking - Erez Metula, AppSec
PDF
Security testing in mobile applications
PPTX
Understanding android security model
PDF
Tips To Protect Your Mobile App from Hackers.pdf
PDF
16 Ways to Create a Secure Android Application
Dos and Don'ts of Android Application Security (Security Professional Perspec...
Top Practices You Need To Develop Secure Mobile Apps.
Mobile application security Guidelines
Mobile App Security: Enterprise Checklist
Android App Development - Factors to be Considered Before Outsourcing
Introduction to Android Application Security Testing - 2nd Sep 2017
Android Security
How to Build Secure Mobile Apps.pdf
Mobile Banking Security: Challenges, Solutions
Secure Enterprise App Development_ Best Practices.pdf
Android security
Outsmarting smartphones
Challenges in Testing Mobile App Security
DroidCon 2015 - Building Secure Android Apps For The Enterprise
Analysis and research of system security based on android
Android App Hacking - Erez Metula, AppSec
Security testing in mobile applications
Understanding android security model
Tips To Protect Your Mobile App from Hackers.pdf
16 Ways to Create a Secure Android Application
Ad

More from Appknox (11)

PDF
What are the Types of SQL Injection Attacks?
PDF
Appknox Enterprise Offerings
PDF
2016 Year in Review - Our Top 10 Blog Posts On Mobile Application Security
PDF
The Ultimate Security Checklist While Launching Your Android App
PDF
Security Report of Top 100 Mobile Banking Apps - APAC
PDF
10 Reasons Why Apple Rejects Apps From The App Store
PPTX
#Chennai needsyou
PPTX
5 Must Watch Movies on Hacking
PPTX
Top 5 Mobile Trends To Look For In 2015
PDF
5 Signs You Should Invest in Security
PPTX
5 Things CIOs Need To Take Care With BYOD Security
What are the Types of SQL Injection Attacks?
Appknox Enterprise Offerings
2016 Year in Review - Our Top 10 Blog Posts On Mobile Application Security
The Ultimate Security Checklist While Launching Your Android App
Security Report of Top 100 Mobile Banking Apps - APAC
10 Reasons Why Apple Rejects Apps From The App Store
#Chennai needsyou
5 Must Watch Movies on Hacking
Top 5 Mobile Trends To Look For In 2015
5 Signs You Should Invest in Security
5 Things CIOs Need To Take Care With BYOD Security

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
August Patch Tuesday
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mushroom cultivation and it's methods.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
August Patch Tuesday
A comparative analysis of optical character recognition models for extracting...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
A comparative study of natural language inference in Swahili using monolingua...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf
Encapsulation_ Review paper, used for researhc scholars
cloud_computing_Infrastucture_as_cloud_p
Advanced methodologies resolving dimensionality complications for autism neur...
Mushroom cultivation and it's methods.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
1. Introduction to Computer Programming.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
SOPHOS-XG Firewall Administrator PPT.pptx
Building Integrated photovoltaic BIPV_UPV.pdf

The Ultimate Security Checklist Before Launching Your Android App

  • 1. The Ultimate Security Checklist Before Launching Your Android App Enterprise Grade Mobile Security
  • 2. Use the Android Application Sandbox, which isolates your app data and code execution from other apps. 1. Enterprise Grade Mobile Security
  • 3. Use an encrypted filesystem that can be enabled to protect data on lost or stolen devices. 2. Enterprise Grade Mobile Security
  • 4. Ensure that the registration and activation process is robust. 3. Enterprise Grade Mobile Security
  • 5. Minimize the number of permissions that your app requests. 4. Enterprise Grade Mobile Security
  • 6. Have application-defined permissions to control application data on a per- app basis. 5. Enterprise Grade Mobile Security
  • 7. Have user-granted permissions to restrict access to system features and user data. 6. Enterprise Grade Mobile Security
  • 8. Do not store sensitive information on external storage, such as SD Cards. These are globally readable and writable. 7. Enterprise Grade Mobile Security
  • 9. Apply caution using network transactions because it involves transmitting data that is potentially private to the user. 8. Enterprise Grade Mobile Security
  • 10. Perform strong input validations. Insufficient input validation is a common security problem affecting applications, regardless of the platform they run on. 9. Enterprise Grade Mobile Security
  • 11. Native code that gets received over the network or from an IPC is vulnerable to threat. You can prevent it by careful handling pointers & managing buffers. 10. Enterprise Grade Mobile Security
  • 12. If you are using data within queries that are submitted to an SQL database or a content provider, SQL injection may be an issue. The best defense is to use parameterized queries. 11. Enterprise Grade Mobile Security
  • 13. Apply caution in using WebView because it consumes web content like HTML & JavaScript - improper use leads to web security issues such as cross-site-scripting (JavaScript injection). 12. Enterprise Grade Mobile Security
  • 14. Minimize the frequency of asking for user credentials—it makes phishing attacks more conspicuous, and less likely to be successful. Instead use an authorization token and refresh it. 13. Enterprise Grade Mobile Security
  • 15. Android provides algorithms for protecting data using cryptography such as supporting full- filesystem encryption & providing secure communication channels. 14. Enterprise Grade Mobile Security
  • 16. A few apps implement IPC using traditional Linux techniques such as network sockets and shared files. Use Android system functionality for IPC such as Intent, Binder or Messenger with a Service, and BroadcastReceiver. 15. Enterprise Grade Mobile Security
  • 17. Intents are the preferred mechanism for asynchronous IPC in Android. Depending on your application requirements, you might use sendBroadcast(), sendOrderedBroadcast(), or an explicit intent to a specific application component. 16. Enterprise Grade Mobile Security
  • 18. Using Binder or Messenger is the preferred mechanism for RPC-style IPC in Android. They provide a well-defined interface that enables mutual authentication of the endpoints, if required. 17. Enterprise Grade Mobile Security
  • 19. Do not load code from outside of your application APK. It significantly increases the likelihood of application compromise due to code injection or code tampering. 18. Enterprise Grade Mobile Security
  • 20. Maintain security of the backend APIs (services) and the platform (server). 19. Enterprise Grade Mobile Security
  • 21. Ensure secure distribution and provisioning of mobile applications. 20. Enterprise Grade Mobile Security
  • 22. Use encrypted communications between clients and servers through properly configured SSL. 21. Enterprise Grade Mobile Security
  • 23. CONCLUSION Here you go with the 21 most essential checks that you should perform before launching your Android App. Even if you already have, it would be a good revisit. Enterprise Grade Mobile Security
  • 24. REGISTER FOR A FREE SECURITY SCAN Appknox helps you unlock the security issues in your mobile app & suggests immediate action! Register Now! Enterprise Grade Mobile Security