Page 126 - GIGW2
P. 126
CH 11 Mobile App Guidelines
and the backend APIs. Also developers should always keep in mind that the
mobile device is liable to be easily misplaced/lost and the user may also use open
networks where data can be easily compromised.
a. Wherever possible sensitive information must not stored be on the
mobile.
b. App should be checked against the mobile app security
https://www.owasp.org/images/1/1b/Mobile_App_Security_
Checklist_0.9.3.xlsx
c. Mobile app and APIs MUST be security audited by Cert-in
empanelled vendors.
d. Follow platform specific Security best practices.
Android
https://developer.android.com/training/articles/security-tips.html
IOS: https://developer.apple.com/security/
e. Only HTTPS must be used to access APIs
11.5.8 App Expiry
Due to increased visibility and ease of use mobile apps are launched for time
bound events such as elections, examinations etc. Hence purpose and relevant
timelines should be clearly indicated for the app. On completion of pre-decided
timeline the app should be removed from the play-store. In addition to this the
app should also be able to generate notification on the installed device informing
the user about the end of the life cycle.
11.5.9 Data Capture for key elements
The data capture for key elements of the App Such as Aadhar, Voter-ID, PAN,
Vehicle numbers, employee-id, beneficiary-id etc. may be read as QR CODE
(2D Barcode) in order to eliminate typo errors and to provide service instantly.
Care should be taken to implement the guideline form UIDAI whenever Aadhar
number and e-KYC details are used.
11.6
Hosting
11.6.1 Mobile API Hosting
a. Security Audited APIs MUST be hosted in highly secure data centers
112