Use certificate pinning
Summary
Mobile applications should use certificate pinning to validate the endpoints. If a pinset is used, up to 2 certificates should be allowed.
Description
empty
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🔴 |
Squad | 🟢 |
References
- CAPEC™-94. Adversary in the middle (AiTM)
- CWE™-297. Improper validation of certificate with host mismatch
- OWASP TOP 10-A7. Identification and authentication failures
- OWASP-M TOP 10-M6. Insecure authorization
- MITRE ATT&CK®-M1040. Behavior prevention on endpoint
- CMMC-PE_L1-3_10_5. Manage physical access
- HITRUST CSF-10_c. Control of internal processing
- ISO/IEC 27002-8_1. User endpoint devices
- ISO/IEC 27002-8_26. Application security requirements
- ISA/IEC 62443-IAC-1_9. Strength of public key authentication
- ISA/IEC 62443-UC-2_3. Use control for portable and mobile devices
- PTES-7_4_2_7. Post exploitation - Pillaging (certificate authority)
- C2M2-9_3_b. Implement IT and OT asset security for cybersecurity architecture
- ISO/IEC 27001-8_1. User endpoint devices
- ISO/IEC 27001-8_26. Application security requirements
Vulnerabilities
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.