...
Rule | Rule Text | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|---|
DRD??-J | Do not log sensitive information to on-device logs |
|
|
|
|
|
DRD??-J | Do not store sensitive information to unprotected location |
|
|
|
|
|
DRD??-J | When store sensitive data, encrypt it and give proper file permissions |
|
|
|
|
|
DRD??-J | Ensure there are strong server side controls, or do not count on confidentiality or integrity of data sent to server | |||||
DRD??-J | Ensure sufficient transport layer protection | |||||
DRD??-J | Do not store some types of very sensitive data | |||||
DRD??-J | Do not ignore certification validation errors and then fall back to clear text communications | |||||
DRD07 DRD??-J | Validate all data sent to and received from untrusted third-party applications before processing | |||||
DRD??-J | No writing to SD card unless data identified as no privileges needed |
...