Strengthen the SSDLC for Enterprise Mobile Applications – Phases 1-3

Author(s): Altaz Valani, Andrew Kum-Seun, Kevin Kim

Mobile exposes your enterprise systems to new vectors that attackers can exploit, whether that be on the device, over the air, or through back-end systems. Enable your developers with the appropriate resources and technology to build mobile apps securely. This blueprint will help you:

  • Assess your secure mobile development practices.
  • Implement and test your secure mobile techniques.
  • Monitor and support your secure mobile applications.