Mobile exposes your enterprise systems to new vectors that attackers can exploit, whether that be on the device, over the air, or through back-end systems. Assess your current mobile applications to determine how secure or how vulnerable they are based on the development techniques your developers currently employ.
This phase of the blueprint, Strengthen the SSDLC for Enterprise Mobile Applications, will walk you through the following:
- Establish the triggers of your secure mobile development initiatives.
- Assess the security vulnerabilities in your mobile applications from an end-user perspective.
- Understand the execution of your mobile environment with a systems architecture.
- Assess the mobile threats and vulnerabilities to your systems architecture.