APP.1.4 | Name | CIA | G 0.9 | G 0.14 | G 0.15 | G 0.16 | G 0.17 | G 0.18 | G 0.19 | G 0.20 | G 0.21 | G 0.23 | G 0.25 | G 0.26 | G 0.28 | G 0.31 | G 0.32 | G 0.36 | G 0.38 | G 0.39 | G 0.42 |
APP.1.4.A1 | Anforderungsanalyse für die Nutzung von Apps | | X | X | X | X | X | X | X | | | | X | X | | | | | X | | |
APP.1.4.A2 | ENTFALLEN | | | | | | | | | | | | | | | | | | | | |
APP.1.4.A3 | Verteilung schutzbedürftiger Apps | | | X | | | | X | X | X | X | X | | | | | X | | | X | |
APP.1.4.A4 | ENTFALLEN | | | | | | | | | | | | | | | | | | | | |
APP.1.4.A5 | Minimierung und Kontrolle von App-Berechtigungen | | | X | X | | | | X | | X | | | | | | X | | X | X | X |
APP.1.4.A6 | ENTFALLEN | | | | | | | | | | | | | | | | | | | | |
APP.1.4.A7 | Sichere Speicherung lokaler App-Daten | | | X | | X | X | | X | | | | | | | | | | | | |
APP.1.4.A8 | Verhinderung von Datenabfluss | | | X | X | | | | X | | | | | | | | | | X | | |
APP.1.4.A9 | ENTFALLEN | | | | | | | | | | | | | | | | | | | | |
APP.1.4.A10 | ENTFALLEN | | | | | | | | | | | | | | | | | | | | |
APP.1.4.A11 | ENTFALLEN | | | | | | | | | | | | | | | | | | | | |
APP.1.4.A12 | Sichere Deinstallation von Apps | | | X | | | | X | X | | | | | | | | | | X | | |
APP.1.4.A13 | ENTFALLEN | | | | | | | | | | | | | | | | | | | | |
APP.1.4.A14 | Unterstützung zusätzlicher Authentisierungsmerkmale bei Apps | CI | | X | | X | X | X | X | | | X | | | | | X | X | | | |
APP.1.4.A15 | Durchführung von Penetrationstests für Apps | CIA | | | | | | | | | X | X | X | X | X | | | | | | |
APP.1.4.A16 | Mobile Application Management | CIA | | | | | | X | | | | | | | | X | | | | | |