Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

ITL Bulletin March 2015

Guidance for Secure Authorization of Mobile Applications in the Corporate Environment

Date Published: March 2015

Author(s)

Kerry McKay (NIST), Kim Quill (G2), Gregory Witte (G2)

Abstract

Keywords

app vetting; apps; malware; mobile devices; security requirements; security vetting; smartphones; software assurance; software security; software testing; software vetting
Control Families

Planning; Risk Assessment; System and Communications Protection;

Documentation

Publication:
March 2015 ITL Bulletin

Supplemental Material:
None available

Topics

Security and Privacy
planning; security automation; threats; vulnerability management

Technologies
mobile