Regulatory Guideline For Mobile Banking App Security
Regulatory Guideline For Mobile Banking App Security
Introduction:
As the financial services sector continues to embrace mobile technology, ensuring the security of
mobile banking applications is paramount. This guideline outlines the security requirements for
mobile banking applications, focusing on the integration of Runtime Application Self-Protection
(RASP) technology and adherence to the OWASP Top 10 Mobile Security Risks. Financial
institutions must implement these measures to protect user data and maintain the integrity of
mobile banking services.
Financial institutions must ensure that mobile banking applications are protected against the
following mobile-specific threats and conditions:
Financial institutions must ensure that mobile banking applications address the OWASP
Mobile Security Risks, which include:
Financial institutions must implement the following protection measures to safeguard mobile
banking applications:
Sr.
Protection Features
No
Detect rooted or jailbroken devices to prevent compromised OS
1 Rooted Devices environments. Implement multiple layers and levels of root
detection mechanisms.
Verify application signature using encrypted and embedded
2 Repackaging Detection
original public key in the RASP SDK.
Code Injection Validate the origin of third-party libraries and prevent runtime
3
Protection hooking.
Prevent debuggers from attaching to the application by checking
4 Debugger Protection
for external processes at runtime.
5 Emulator Detection Detect emulators by examining device characteristics.
Ensure that the operating system uses a trusted keyboard to
6 Key Logger Protection
prevent malicious apps from stealing credentials.
Prevent sensitive information from persisting in phone memory
Screenshot and Screen
7 after application termination and detect video output streams or
Mirroring Protection
mirroring applications.
Screen Reader Prevent malware from activating screen readers to collect
8
Protection sensitive information.
Android Developer
9 Prevent application usage when ADB is activated.
Bridge Status
Developer Mode Status
10 Prevent application launch while developer mode is on.
Detection
Detecting Apps from
11 Detect if the app is downloaded from an untrusted source.
Untrusted Sources
Task Hijacking Prevent the application from being hijacked via untrusted
12
Protection keyboards or screen readers.
13 Virtual Space Detection Detect if the application is launched via a virtual space app.
By adhering to these guidelines, financial institutions can ensure the security of their mobile
banking applications, protect user data, and maintain the trust and confidence of their users.