-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Port MASTG-TEST-0012: Testing the Device-Access-Security Policy (android) (by @guardsquare) #3113
Conversation
demos/android/MASVS-STORAGE/MASTG-DEMO-0021/MastgTest_reversed.java
Outdated
Show resolved
Hide resolved
|
||
## Overview | ||
|
||
This test verifies that an application is running on a device with a set passcode. A set passcode ensures that data on the device is encrypted and access to the device is restricted. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we also include this?
From the weakness draft:
to make sure that biometrics can be used, verify that the
kSecAttrAccessibleWhenPasscodeSetThisDeviceOnly
or thekSecAttrAccessibleWhenPasscodeSet
protection class is set when theSecAccessControlCreateWithFlags
method is called
To use Optic ID, Face ID, or Touch ID, the user must set up their device so that a passcode or password is required to unlock it.
https://support.apple.com/en-ph/guide/security/sec9479035f1/web
…ice security enforcement
demos/android/MASVS-STORAGE/MASTG-DEMO-0021/output_debuggable_system.txt
Outdated
Show resolved
Hide resolved
…atePolicy calls with detailed backtrace
…tus and improve passcode reporting
…ometric authentication status messages
…e logging with a default of 8 lines
…s and application configuration
… necessary permissions and application configuration
This PR closes #2937