Mobile Working Group

Current Initiatives

Initiative Details Date Opened

Application Security

Understanding the limited opportunities to secure apps from secure coding practices, third party security add ons, and testing procedures in app stores.

June 26, 2015 Contribute now

Security Guidance for Early Adopters of IoT

Understanding the fundamental concepts of authentication in layered mobile computing environments to ensure proper implementation, maintenance, and monitoring of secure mobile devices.

June 26, 2015 Contribute now

Mobile Authentication

Understanding the fundamental concepts of authentication in layered mobile computing environments to ensure proper implementation, maintenance, and monitoring of secure mobile devices.

June 26, 2015 Contribute now

Mobile Application Security Testing

Mobile applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emergence of cloud computing. The Mobile Application Security Testing initiative will aim to create a safer cloud ecosystem for mobile applications by creating systematic approaches to application testing and vetting that helps integrate and introduce quality control and compliance to mobile application development and management.

May 23, 2015 Contribute now

Mobile BYOD Policy Guidance

It is becoming common for employees to request (demand) the ability to use their personal mobile devices(*) in the course of their work related activities. Allowing them to do so may improve employee productivity, talent retention and business agility but probably runs contrary to existing Corporate/IT policy. A strategy should be chosen to provide the desired level of control, such as a containerization of company data and applications or a full-device, MDM centric approach.

April 28, 2014 Contribute now

Mobile App Security

The security of smart phones and the software being used on them will become increasingly important. The CSA Mobile Working Group is trying to identify and document recommendations to establish guidelines for the mobile device environment.

April 01, 2013 Contribute now

Introduction to the Mobile Working Group

Mobile computing is experiencing tremendous growth and adoption, while the devices are gaining significant power and dynamic capabilities. Personally owned mobile devices are increasingly being used to access employers’ systems and cloud-hosted data – both via browser-based and native mobile applications. Clouds of mobile devices are likely to be common. The CSA Mobile working group will be responsible for providing fundamental research to help secure mobile endpoint computing from a cloud-centric vantage point.

Working Group Scope and Responsibilities

The working group is chartered to research the following areas:

  • Securing application stores and other public entities deploying software to mobile devices
  • Analysis of mobile security capabilities and features of key mobile operating systems
  • Cloud-based management, provisioning, policy, and data management of mobile devices to achieve security objectives
  • Guidelines for the mobile device security framework and mobile cloud architectures
  • Scalable authentication from mobile devices to multiple, heterogeneous cloud providers
  • Best practices for secure mobile application development and securely enabling existing applications on mobile platforms
  • Identification of primary risks related to individually owned devices accessing organizational systems (commonly known as BYOD – Bring Your Own Device)
  • Solutions for resolving multiple usage roles related to BYOD, e.g. personal and business use of a common device

Want to contribute to the Mobile Working Group?

Fill out the form below to join today!


Other:

If you experience trouble using this form, please submit the information here.

Mobile Working Group News

November 07, 2013

Cloud Security Alliance Annual Congress to Serve as Launchpad for New Research, Guidance Reports and Working Groups

CSA today released its planned research agenda and a preview of new working groups to be launched at the upcoming CSA Congress 2013, taking place December 4-5 in Orlando.

September 24, 2013

Cloud Security Alliance Mobile Working Group Opens Annual Mobile Market Maturity Survey

Group seeks global input to understand current market maturity and needed processes to manage enterprise mobile technology.

February 12, 2013

CSA Announces Working Group Sessions at RSA in San Francisco

CSA is hosting sessions during the week for some of our active working groups. These are free events that will be held outside of the regular conference on Thursday, February 28th.

November 08, 2012

Cloud Security Alliance Releases Security Guidance for Critical Areas of Mobile Computing

CSA Mobile Working Group report aims to provide industry with mobile security best practices.

October 25, 2012

CSA Seeks Input on a Mobile App Store Security Initiative Policy Guideline Document

The CSA Mobile Working Group would like to invite you to review and comment on their Mobile App Store Security Initiative Policy Guideline document that was created by their Initiative 5 sub-group.

October 19, 2012

CSA Seeks Input on a Mobile Authentication Document

Review and comment on the Mobile Authentication Document that was created by their Initiative 4 Authentication Sub-group.

October 19, 2012

CSA Seeks Input on a Mobile BYOD Document

Review and comment on the Bring Your Own Device (BYOD) Document that was created by their Initiative 3 BYOD Sub-group.

October 16, 2012

Take The CSA Mobile Maturity Questionnaire

This brief 5-10 minute survey is designed to help the Cloud Security Alliance, as well as, enterprises and individual consumers understand the current maturity level of the mobile marketplace.

October 04, 2012

Data Loss from Missing Mobile Devices Ranks as Top Mobile Device Threat by Enterprises

CSA Mobile Working Group today released findings from a new survey that calls out the specific security concerns enterprise executives say are the real and looming threats as it relates to mobile device security in the enterprise environment.

September 20, 2012

CSA Identifies 17 Key Components for Effective Mobile Device Management of BYOD and Company-Owned Devices

The whitepaper is one of six parts to the upcoming, “Security Guidance for Critical Areas of Mobile Computing” report, one of a number of important research items to be presented and discussed at the upcoming annual CSA Congress being held November 7-8 in Orlando.

July 18, 2012

CSA Research Sponsorship Opportunities Available

CSA announces the availability of several new opportunities to sponsor key research initiatives. Your support helps us maintain our aggressive research schedule and accelerate responsible adoption of cloud computing.

July 11, 2012

Take the CSA Top Threats to Mobile Computing Survey

Due to the rapid adoption of mobile computing, and immediate connection to cloud computing, the CSA is creating a “Top Threats to Mobile Computing” report.

July 07, 2012

CSA Seeks Input on “Mobile Device Management: Key Components” whitepaper

The peer review site and survey will be open until Friday, July 20th, 2012.

March 20, 2012

Mobile Working Group Kick-Off (Call 2)

To accommodate all time zones, CSA will now be launching a Mobile Working Group kick-off (call 2) after our call 1 was held on March 15th.

February 27, 2012

CSA Launches Mobile and Innovation Initiatives at RSA

Cloud Security Alliance (CSA) today announced two significant new initiatives for 2012, addressing growing areas of need in cloud security – mobile computing and innovation.

Mobile Working Group Downloads

Security Guidance for Critical Areas of Mobile Computing

Security Guidance for Critical Areas of Mobile Computing

Mobile devices empower employees to do what they need to do — whenever and wherever. People can work and collaborate “in the field” with customers, partners, patients or students and each other. But they need to be supported with always current operational processes and information, whether from apps, the Internet, or documents from other people.

Release Date: November 08, 2012

Mobile Top Threats

Mobile Top Threats

Release Date: October 04, 2012

Mobile Device Management: Key Components

Mobile Device Management: Key Components

Release Date: September 20, 2012

Mobile Working Group Charter

Mobile Working Group Charter

Release Date: February 21, 2012

Mobile Working Group Co-chairs

David Lingenfelter

David Lingenfelter is a seasoned security professional with nearly 20 years of experience in risk management, information security, compliance and policy development. He is responsible for oversight of all security and compliance aspects of Fiberlink, an IBM company, including physical, application, network and data security. David successfully managed Fiberlink through the FISMA certification process, including proposed FedRAMP controls. David helped design Fiberlink’s cloud architecture model, and is an active member of the Cloud Security Alliance including being a co-chair for their Mobile Working Group and contributor to the development of the CSA Cloud Controls Matrix as well as being active in several other working groups. A noted expert and thought leader in mobile security, David frequently gives presentations on Cloud and Mobile technologies and has presented for ISACA, ISSA, Cloud Security Alliance, InfraGard and GTRA among others. David has also been quoted as a subject matter expert in a number of different publications.

Cesare Garlati

Cesare Garlati is one of the most quoted and sought-after thought leaders in the enterprise mobility space. Former Vice President of Mobile Security at Trend Micro, Cesare currently serves as Co-Chair of the CSA Mobile Working Group – Cloud Security Alliance. Prior to Trend Micro, Mr. Garlati held director positions within leading mobility companies such as iPass, Smith Micro Software and WaveMarket. Prior to this, he was senior manager of product development at Oracle, where he led the development of Oracle’s first cloud application and many other modules of the Oracle E-Business Suite.

Cesare holds a Berkeley MBA, a BS in Computer Science and numerous professional certifications from Microsoft, Cisco and Sun.