Mobile Working Group

Mobile Guidance

Current Initiatives

Mobile Application Security Testing Initiative

Mobile applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emergence of cloud computing. The Mobile Application Security Testing initiative will aim to create a safer cloud ecosystem for mobile applications by creating systematic approaches to application testing and vetting that helps integrate and introduce quality control and compliance to mobile application development and management.

Mobile Authentication

Understanding the fundamental concepts of authentication in layered mobile computing environments to ensure proper implementation, maintenance, and monitoring of secure mobile devices.

Internet of Things (IoT)

Categorizing common IoT device types, markets, and architectures while associating each category with appropriate cloud security standards, security controls, best practices, and relevant governance.

Application Security

Understanding the limited opportunities to secure apps from secure coding practices, third party security add ons, and testing procedures in app stores.

Introduction to the Mobile Working Group

Mobile computing is experiencing tremendous growth and adoption, while the devices are gaining significant power and dynamic capabilities. Personally owned mobile devices are increasingly being used to access employers’ systems and cloud-hosted data - both via browser-based and native mobile applications. Clouds of mobile devices are likely to be common. The CSA Mobile working group will be responsible for providing fundamental research to help secure mobile endpoint computing from a cloud-centric vantage point.

Working Group Scope and Responsibilities

The working group is chartered to research the following areas:

  • Securing application stores and other public entities deploying software to mobile devices
  • Analysis of mobile security capabilities and features of key mobile operating systems
  • Cloud-based management, provisioning, policy, and data management of mobile devices to achieve security objectives
  • Guidelines for the mobile device security framework and mobile cloud architectures
  • Scalable authentication from mobile devices to multiple, heterogeneous cloud providers
  • Best practices for secure mobile application development and securely enabling existing applications on mobile platforms
  • Identification of primary risks related to individually owned devices accessing organizational systems (commonly known as BYOD – Bring Your Own Device)
  • Solutions for resolving multiple usage roles related to BYOD, e.g. personal and business use of a common device

Sponsors of CSA Mobile Research

The Cloud Security Alliance would like to thank the corporate sponsors that make our research possible. Their continued support enables our working groups to produce the high-quality research products you've come to expect from the Cloud Security Alliance.


Mobile Device Management: Key Components

Top Threats to Mobile Computing

Co-Chair: Cesare Garlati

Cesare Garlati is one of the most quoted and sought-after thought leaders in the enterprise mobility space. Former Vice President of Mobile Security at Trend Micro, Cesare currently serves as Co-Chair of the CSA Mobile Working Group – Cloud Security Alliance. Prior to Trend Micro, Mr. Garlati held director positions within leading mobility companies such as iPass, Smith Micro Software and WaveMarket. Prior to this, he was senior manager of product development at Oracle, where he led the development of Oracle’s first cloud application and many other modules of the Oracle E-Business Suite.

Cesare holds a Berkeley MBA, a BS in Computer Science and numerous professional certifications from Microsoft, Cisco and Sun.

Co-Chair: David Lingenfelter, Fiberlink

David Lingenfelter is a seasoned security professional with nearly 20 years of experience in risk management, information security, compliance and policy development. He is responsible for oversight of all security and compliance aspects of Fiberlink, an IBM company, including physical, application, network and data security. David successfully managed Fiberlink through the FISMA certification process, including proposed FedRAMP controls. David helped design Fiberlink’s cloud architecture model, and is an active member of the Cloud Security Alliance including being a co-chair for their Mobile Working Group and contributor to the development of the CSA Cloud Controls Matrix as well as being active in several other working groups. A noted expert and thought leader in mobile security, David frequently gives presentations on Cloud and Mobile technologies and has presented for ISACA, ISSA, Cloud Security Alliance, InfraGard and GTRA among others. David has also been quoted as a subject matter expert in a number of different publications.

Leadership Contact

[email protected]

Key Links & Resources

Security Guidance for Critical Areas of Mobile Computing

Security Guidance for Critical Areas of Mobile Computing

Mobile devices empower employees to do what they need to do — whenever and wherever. People can work and collaborate “in the field” with customers, partners, patients or students and each other. But they need to be supported with always current operational processes and information, whether from apps, the Internet, or documents from other people.

Release Date: November 08, 2012

Mobile Top Threats

Mobile Top Threats

Release Date: October 04, 2012

Mobile Device Management: Key Components

Mobile Device Management: Key Components

Release Date: September 20, 2012

Mobile Working Group Charter

Mobile Working Group Charter

Release Date: February 21, 2012

Mobile Working Group News

April 24, 2014

Volunteer Spotlight: David Lingenfelter

David Lingenfelter is a seasoned security professional with nearly 20 years of experience in risk management, information security, compliance and policy development.

November 07, 2013

Cloud Security Alliance Annual Congress to Serve as Launchpad for New Research, Guidance Reports and Working Groups

CSA today released its planned research agenda and a preview of new working groups to be launched at the upcoming CSA Congress 2013, taking place December 4-5 in Orlando.

September 24, 2013

Cloud Security Alliance Mobile Working Group Opens Annual Mobile Market Maturity Survey

Group seeks global input to understand current market maturity and needed processes to manage enterprise mobile technology.

February 12, 2013

CSA Announces Working Group Sessions at RSA in San Francisco

CSA is hosting sessions during the week for some of our active working groups. These are free events that will be held outside of the regular conference on Thursday, February 28th.

November 08, 2012

Cloud Security Alliance Releases Security Guidance for Critical Areas of Mobile Computing

CSA Mobile Working Group report aims to provide industry with mobile security best practices.

October 25, 2012

CSA Seeks Input on a Mobile App Store Security Initiative Policy Guideline Document

The CSA Mobile Working Group would like to invite you to review and comment on their Mobile App Store Security Initiative Policy Guideline document that was created by their Initiative 5 sub-group.

October 19, 2012

CSA Seeks Input on a Mobile Authentication Document

Review and comment on the Mobile Authentication Document that was created by their Initiative 4 Authentication Sub-group.

October 19, 2012

CSA Seeks Input on a Mobile BYOD Document

Review and comment on the Bring Your Own Device (BYOD) Document that was created by their Initiative 3 BYOD Sub-group.

October 16, 2012

Take The CSA Mobile Maturity Questionnaire

This brief 5-10 minute survey is designed to help the Cloud Security Alliance, as well as, enterprises and individual consumers understand the current maturity level of the mobile marketplace.

October 04, 2012

Data Loss from Missing Mobile Devices Ranks as Top Mobile Device Threat by Enterprises

CSA Mobile Working Group today released findings from a new survey that calls out the specific security concerns enterprise executives say are the real and looming threats as it relates to mobile device security in the enterprise environment.