
Today our smartphones and tablets are fundamental for citizens and hold a wide range of user data and apps. At the same time, security attacks have increased with malicious applications and network eavesdropping. To define security and assurance requirements for smart phones and tablets, mitigate potential risks and protect users, ETSI has released a world class standard called Consumer Mobile Device Protection Profile, ETSI TS 103 732. The specification identifies key security and privacy risks for user data and provides appropriate protection.
“Following the excellent improvement in security achieved with ETSI EN 303 645 for consumer IoT devices, ETSI has been working on securing other consumer devices. ETSI TS 103 732 provides a complete solution to secure smart phones and tablets, minimizing privacy risks and maximizing user confidence that their smart devices protect their data“ says Alex Leadbeater, ETSI Cybersecurity Chair.
The new ETSI standard specifies security requirements for consumer mobile devices. It ensures the protection of key user data such as photos, videos, user location, emails, SMS, calls, passwords for web services, and fitness related data.
The ETSI specification has a broad coverage of security features including cryptographic support, user data protection, identification and authentication, security management, privacy protection, resistance to physical attack, secure boot, and trusted communication channels.
In addition, ETSI TS 103 732 defines the security assurance requirements based on Common Criteria and it is therefore also suitable for certification initiatives such as the European Cybersecurity Act. The standard was developed to support consumer mobile devices manufacturers to achieve security certification. It also offers a common methodology for evaluators to assess the security of consumer mobile devices.
ETSI TS 103 732 is the first of a series of ETSI EN 303 645 derivative standards on consumer cybersecurity that ETSI will be delivering within the next twelve to eighteen months.
For more information, please visit us at https://www.etsi.org/
Fachartikel

Cyberkriminelle nutzen GitHub zur Verbreitung von Schadsoftware

Coralogix launcht MCP-Server: Echtzeit-Zugriff für KI-Agenten auf Observability-Daten

Gesichtserkennung in Windows Hello for Business: Forscher decken neue Schwachstellen auf

DDoS-Gefahr wächst weiter: Cloudflare meldet Rekordwerte im neuen Quartalsbericht

Das M&A-Sicherheitshandbuch: 11 Fragen zur Bewältigung der Cybersicherheit bei Fusionen und Übernahmen
Studien

Bevor der erste Dominostein fällt: Cyberwarfare am Scheideweg

KI-Gesetzgebung: EU vs. USA – Wo stehen wir aktuell?

Quantencomputing rückt näher: Unternehmen bereiten sich auf das Ende heutiger Verschlüsselung vor

Report: Unternehmen bei SaaS-Sicherheit schlecht vorbereitet – Risiken durch KI-Anwendungen nehmen zu

Chief AI Officer als Erfolgsfaktor: Studie zeigt bis zu 36 % höheren ROI bei KI-Investitionen
Whitepaper

Digitalisierung und Sicherheit im Fokus: Initiative überreicht Abschlussbericht an Bundespräsidenten

ISACA veröffentlicht Leitfaden zu NIS2 und DORA: Orientierungshilfe für Europas Unternehmen

CISA und US-Partner warnen kritische Infrastrukturen vor möglichen Cyberangriffen aus dem Iran

Dating-Apps: Intime Einblicke mit Folgen
