Skip to content

Commit e2e4777

Browse files
authored
add page for MASWE
2 parents d489c3b + 3c72fd8 commit e2e4777

File tree

12 files changed

+105
-17
lines changed

12 files changed

+105
-17
lines changed

.wordlist.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -511,3 +511,4 @@ SDLCs
511511
br
512512
Andreas
513513
Happe
514+
MASWE

_data/draft.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,9 @@ docs:
145145
- title: '5.3.3 OWASP Secure Headers Project'
146146
url: implementation/secure_libraries/secure_headers
147147

148+
- title: '5.4 [Mobile application weakness enumeration'
149+
url: implementation/mas_weakness_enumeration
150+
148151
- title: '6. Verification'
149152
url: verification
150153

_data/release.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,9 @@ docs:
145145
- title: '5.3.3 OWASP Secure Headers Project'
146146
url: implementation/secure_libraries/secure_headers
147147

148+
- title: '5.4 [Mobile application weakness enumeration'
149+
url: implementation/mas_weakness_enumeration
150+
148151
- title: '6. Verification'
149152
url: verification
150153

draft/02-toc.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,7 @@ permalink:
6666
5.3.1 [Enterprise Security API library](#enterprise-security-api-library)
6767
5.3.2 [CSRFGuard library](#csrfguard-library)
6868
5.3.3 [OWASP Secure Headers Project](#owasp-secure-headers-project)
69+
5.4 [Mobile application weakness enumeration](#mobile-application-weakness-enumeration)
6970

7071
6 **[Verification](#verification)**
7172
6.1 [Guides](#verification-guides)

draft/05-requirements/06-mas.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ permalink: /draft/requirements/mobile_application_security/
2626

2727
### 3.6 Mobile Application Security
2828

29-
The OWASP [Mobile Application Security][masproject] (MAS) flagship project has the mission statement:
30-
"Define the industry standard for mobile application security".
29+
The OWASP [Mobile Application Security][masproject] (MAS) flagship project provides
30+
industry standards for mobile application security.
3131

3232
The MAS project covers the processes, techniques, and tools used for security testing mobile applications.
3333
It provides a set of test cases that enables testers to deliver consistent and complete results.
@@ -74,7 +74,7 @@ which can be used as a guide to decide if the category should to be included in
7474
* OWASP [Mobile Application Security][mas] (MAS)
7575
* MAS [project][masproject]
7676
* MAS [Checklist][masc]
77-
* MAS Verification Standard ([MASVS][masvs])
77+
* MAS [Verification Standard][masvs] (MASVS)
7878
* OWASP [Mobile Application Security][csmas] cheat sheet
7979

8080
----

draft/06-design/03-mas-checklist.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ permalink: /draft/design/mas_checklist/
2626

2727
### 4.3 Mobile application checklist
2828

29-
The OWASP [Mobile Application Security][masproject] (MAS) flagship project has the mission statement:
30-
"Define the industry standard for mobile application security".
29+
The OWASP [Mobile Application Security][masproject] (MAS) flagship project provides
30+
industry standards for mobile application security.
3131

3232
The OWASP MAS project provides the [Mobile Application Security Verification Standard][masvs] (MASVS)
3333
for mobile applications and a comprehensive [Mobile Application Security Testing Guide][mastg] (MASTG).
@@ -46,6 +46,7 @@ This MAS Checklist is split out into categories that match the MASVS categories:
4646
* [MASVS-PLATFORM](https://mas.owasp.org/checklists/MASVS-PLATFORM/) interactions with the mobile platform
4747
* [MASVS-CODE](https://mas.owasp.org/checklists/MASVS-CODE/) platform and data entry points along with third-party software
4848
* [MASVS-RESILIENCE](https://mas.owasp.org/checklists/MASVS-RESILIENCE/) integrity and running on a trusted platform
49+
* [MASVS-PRIVACY](https://mas.owasp.org/checklists/MASVS-PRIVACY/) privacy of users, data and resources
4950

5051
In addition to the web links there is a [downloadable spreadsheet][masxls].
5152

@@ -69,6 +70,7 @@ This record of test results can be used as evidence for compliance purposes.
6970
* Mobile Application Security ([MAS][masproject]) project
7071
* MAS [Checklist][masc]
7172
* MAS Verification Standard ([MASVS][masvs])
73+
* MAS Testing Guide ([MASTG][mastg])
7274
* OWASP [Mobile Application Security][csmas] cheat sheet
7375

7476
----

draft/07-implementation/00-toc.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,7 @@ Sections:
5151
5.3.1 [Enterprise Security API library](#enterprise-security-api-library)
5252
5.3.2 [CSRFGuard library](#csrfguard-library)
5353
5.3.3 [OWASP Secure Headers Project](#owasp-secure-headers-project)
54+
5.4 [Mobile application weakness enumeration](#mobile-application-weakness-enumeration)
5455

5556
----
5657

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
---
2+
3+
title: MAS Weakness Enumeration
4+
layout: col-document
5+
tags: OWASP Developer Guide
6+
contributors: Jon Gadsden
7+
document: OWASP Developer Guide
8+
order: 640
9+
permalink: /draft/implementation/mas_weakness_enumeration/
10+
11+
---
12+
13+
{% include breadcrumb.html %}
14+
15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![MAS checklist logo](../../../assets/images/logos/mas.png "OWASP MASWE"){: .image-right }
26+
27+
### 5.4 Mobile application weakness enumeration
28+
29+
The OWASP [Mobile Application Security][masproject] (MAS) flagship project provides
30+
industry standards for mobile application security.
31+
32+
The OWASP MASWE project ...
33+
34+
#### What is the MASWE?
35+
36+
The MAS Weakness Enumeration ...
37+
38+
The MASWE is split out into weakness categories that match the MASVS verification categories:
39+
40+
* [MASVS-STORAGE](https://mas.owasp.org/MASWE/MASVS-STORAGE/MASWE-0001/) sensitive data storage
41+
* [MASVS-CRYPTO](https://mas.owasp.org/MASWE/MASVS-CRYPTO/MASWE-0009/) cryptography best practices
42+
* [MASVS-AUTH](https://mas.owasp.org/MASWE/MASVS-AUTH/MASWE-0028/) authentication and authorization mechanisms
43+
* [MASVS-NETWORK](https://mas.owasp.org/MASWE/MASVS-NETWORK/MASWE-0047/) network communications
44+
* [MASVS-PLATFORM](https://mas.owasp.org/MASWE/MASVS-PLATFORM/MASWE-0053/) interactions with the mobile platform
45+
* [MASVS-CODE](https://mas.owasp.org/MASWE/MASVS-CODE/MASWE-0075/) platform and third-party software
46+
* [MASVS-RESILIENCE](https://mas.owasp.org/MASWE/MASVS-RESILIENCE/MASWE-0089/) integrity and running on a trusted platform
47+
* [MASVS-PRIVACY](https://mas.owasp.org/MASWE/MASVS-PRIVACY/MASWE-0108/) privacy of users, data and resources
48+
49+
#### Why use it?
50+
51+
#### How to use it
52+
53+
#### References
54+
55+
* Mobile Application Security ([MAS][masproject]) project
56+
* MAS [Checklist][masc]
57+
* MAS Testing Guide ([MASTG][mastg])
58+
* MAS Verification Standard ([MASVS][masvs])
59+
* MAS Testing Guide ([MASTG][mastg])
60+
61+
----
62+
63+
The OWASP Developer Guide is a community effort; if there is something that needs changing
64+
then [submit an issue][issue0704] or [edit on GitHub][edit0704].
65+
66+
[edit0704]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/07-implementation/04-maswe.md
67+
[issue0704]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=enhancement&template=request.md&title=Update:%2006-design/07-implementation/04-maswe
68+
[masproject]: https://owasp.org/www-project-mobile-app-security/
69+
[masc]: https://mas.owasp.org/checklists/
70+
[mastg]: https://mas.owasp.org/MASTG/
71+
[masvs]: https://mas.owasp.org/MASVS/
72+
73+
\newpage

draft/07-implementation/toc.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@ Sections:
6262
5.3.1 [Enterprise Security API library](03-secure-libraries/01-esapi.md)
6363
5.3.2 [CSRFGuard library](03-secure-libraries/02-csrf-guard.md)
6464
5.3.3 [OWASP Secure Headers Project](03-secure-libraries/03-secure-headers.md)
65+
5.4 [Mobile application weakness enumeration](04-maswe.md)
6566

6667
----
6768

draft/09-training-education/01-vulnerable-apps/02-webgoat.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -103,13 +103,14 @@ WebWolf provides:
103103

104104
#### Where to go from here?
105105

106-
Try all the WebGoat lessons, they will certainly inform and educate.
107-
Use WebGoat in demonstrations of your favourite attack chains.
108-
Exercise available attack tools against WebGoat.
109-
110106
Try out the WebGoat desktop environment by running `docker run -p 127.0.0.1:3000:3000 webgoat/webgoat-desktop`
111107
and navigating to `http://localhost:3000/`.
112108

109+
* Try the WebGoat lessons, they will certainly inform and educate
110+
* Exercise available attack tools against WebGoat
111+
* Use WebGoat in demonstrations of your favourite attack chains
112+
* Use WebGoat material in presentations on vulnerabilities
113+
113114
There are various ways of configuring WebGoat, see the [github repo][goatgithub] for more details.
114115

115116
#### References

0 commit comments

Comments
 (0)