M8: Security Misconfiguration
Security misconfiguration encompasses insecure defaults, missing hardening, or ad-hoc changes that leave the mobile app or its infrastructure open to exploitation. Because mobile systems span device settings, backend APIs, cloud services, and CI/CD tooling, misconfigurations can creep in at multiple layers.
Typical Weakness Patterns
- Leaving debug endpoints, verbose logging, or developer menus enabled in production builds.
- Shipping with overly broad platform permissions, entitlements, or exported components (activities, services, broadcast receivers).
- Misconfigured backend services (API gateways, authentication proxies, object storage buckets) that feed the mobile app.
- Using outdated configurations for security headers, SSL/TLS, or content security policies in web views and APIs.
Detection Cues
- Static review of Android manifest/iOS entitlement files for exported components or unnecessary permissions.
- Configuration scanning of backend infrastructure (IaC reviews, CIS benchmarks) supporting the mobile experience.
- Monitoring production logs for access to debug endpoints or other features that should be disabled.
Mitigation
- Integrate hardening checklists into the release process—disable debug features, restrict platform permissions, and enforce production build flags.
- Adopt configuration-as-code with peer review and automated policy enforcement to prevent drift.
- Continuously monitor infrastructure for deviations, enabling alerts when storage buckets become public or when security groups are modified.
- Document configuration baselines so teams know which settings must remain locked down for compliance and security.