Replies: 2 comments
-
Thanks for posting @droidandy. This is the posture of the MASTG on this topic: Let's see what the community has to say on this. Currently we're keeping it as a defense-in- depth MASVS control for MASVS v2. |
Beta Was this translation helpful? Give feedback.
-
As I understood it after some work on it:
For these, if you do not have alternative controls and do not want to accept whatever risk of MiTM, you pay the price of app-unavailability in case a key or cert is no longer in sync (depending on the type of pinning used). |
Beta Was this translation helpful? Give feedback.
-
Hi,
I understand the default answer is probably;
However... I'd like to start a discussion. Is there a benefit to doing this in 2022, when iOS and Android can detect rogue CAs. My understanding is that a successful attack would require a rogue root cert/profile to be installed. Either through clicking or physical access to a handset.
I wondered what peoples thoughts are is there any huge downsides on no longer employing this tactic on mobile apps?
Or convincing and compelling reasons why we should continue to enforce this?
Thanks
Beta Was this translation helpful? Give feedback.
All reactions