U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

ITL Bulletin

Guidance for Secure Authorization of Mobile Applications in the Corporate Environment

Date Published: March 2015

Author(s)

Kerry McKay (NIST), Kim Quill (G2), Gregory Witte (G2)

Abstract

Keywords

app vetting; apps; malware; mobile devices; security requirements; security vetting; smartphones; software assurance; software security; software testing; software vetting
Control Families

Planning; Risk Assessment; System and Communications Protection

Documentation

Publication:
March 2015 ITL Bulletin (pdf)

Supplemental Material:
None available

Document History:
03/19/15: ITL Bulletin (Final)

Topics

Security and Privacy

planning, security automation, threats, vulnerability management

Technologies

mobile