Data Privacy Conference
Rootconf For members

Data Privacy Conference

On building privacy in engineering and product processes.

Make a submission

Accepting submissions till 18 Oct 2021, 01:20 PM

Tickets

Loading…

The first edition of the Data Privacy Conference was held between 23 and 29 April 2021.

The conference featured talks and discussions around:

  1. Processes for doing compliance and building privacy features in large and growing organizations.
  2. Case studies of compliance, mainly GDPR and related practices of data anonymization and data deletion.
  3. Using technology to handle processes for handling Personally Identifiable Information (PII); evaluation of developer tools that organizations use for governing access to PII and sensitive data - and whether to build, rent or buy these.
  4. End-to-end encryption - technology and policy debates; practical applications.
  5. Privacy preserving practices in consumer technology - netbanking and Android and mobile.
  6. Cloud security practices; multi-geography compliance with cloud.

Speakers from LinkedIn, Whatsapp, Hotstar, Mozilla, Zerodha, ThoughtWorks, Appsecco, Gojek and other organizations shared their experiences, and demonstrated how the combination of ‘intent, process, resources and technology’ come together to help companies build privacy-respecting products.

Watch the talks on https://hasgeek.com/rootconf/data-privacy-conference/videos

Participants in the conference included:

  1. SRE, DevSecOps and DevOps teams working with legal and compliance teams to heavy-lift operations around privacy and compliance.
  2. Product managers building secure and compliant systems.
  3. Business and engineering heads of organizations which deal with large volumes of consumer data on a regular basis.
  4. Representatives early to mid-stage fintech companies which are evolving systems to handle petabytes of data securely in compliance with larger governance laws.
  5. Consultants working on cloud and security; pricacy and compliance.

Contact information: Join the Rootconf Telegram group on https://t.me/rootconf or follow @rootconf on Twitter.
For inquiries, contact Rootconf on rootconf.editorial@hasgeek.com or call 7676332020.

Hosted by

Rootconf is a community-funded platform for activities and discussions on the following topics: Site Reliability Engineering (SRE). Infrastructure costs, including Cloud Costs - and optimization. Security - including Cloud Security. more

Supported by

Zeta® is in the business of providing a full-stack, cloud-native, API first neo-banking platform including a digital core and a payment engine for issuance of credit, debit and prepaid products that enable legacy banks and new-age fintech institutions to launch modern retail and corporate fintech p… more

Promoted

We’re the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. As a hyperscale cloud service provider, AWS provides access to highly advanced computing tools on rent for startups and SMEs at affordable prices. We help t… more
Omidyar Network India invests in bold entrepreneurs who help create a meaningful life for every Indian, especially the hundreds of millions of Indians in low-income and lower-middle-income populations, ranging from the poorest among us to the existing middle class. To drive empowerment and social i… more
Deep dives into privacy and security, and understanding needs of the Indian tech ecosystem through guides, research, collaboration, events and conferences. Sponsors: Privacy Mode’s programmes are sponsored by: more
Zainab Bawa

Zainab Bawa

@zainabbawa

Security practices for mobile app development

Submitted Aug 25, 2021

This submission is a summary of the Birds of Feather (BOF) session held on 28 April, 2021 with Chirayu Desai (CalyxOS), Madhusudhan Sambojhu (Able.do) and Apurva Jaiswal (Zeta) on security practices that individual developers and teams can undertake to ensure better data privacy.

The following were some of the key issues discussed, along with possible solutions:

  1. Major data security challenges: For data at rest, tooling is available for iOS and Android platforms that developers can use often, but they don’t. SQL Cipher and Log Management is another area that is often overlooked.
    For data in motion, developers must use HTTPS to communicate over their network (to prevent non-secure transfer of data), be aware of MITM attacks, and refresh persistent tokens constantly. TLS and encrypted channels are recommended as safeguards.
  2. Importance of processes and training: Code peer reviews and automatically triggering static security testing when your builds are getting created can help in securing your application. Regular security testing by an internal security team, or regular application audits by a third-party vendor can help add an additional layer of security.
    Some practices like:
  • Never put secrets in your application code.
  • Always make sure that secrets are stored only on the servers should be followed.
  • Android engineering teams can be staffed with either more engineers or skilled developers because of the fragmentation issue.
  1. Use of vault storage for managing sensitive data: Data at rest can be classified into sensitive data and non-sensitive data. Do not put all of the data in the vault storage because you may want to give some of the data upfront to the user. But all sensitive data, including your private keys, tokens and secrets, must be stored in the private vault storages. Other non-sensitive data such as some configurations, profile information, and probably some metadata can be stored in secure preferences. It is highly recommended that vault storage be accessible only when the user gives the app consent to access it. The developer can use SDKs to ensure that the basic tenets of security are maintained.
  2. Security in Operating Systems (OSes): Mobile devices and mobile operating systems are sandboxed from day one. Application data can only be accessed by the application itself as long as you keep it in internal storage. Even if you don’t use any encryption measures, your data will still be encrypted at rest because these devices are always encrypted by default. The moment you turn off the device, that data is completely encrypted. And when you reboot the device, until you enter the PIN, the data stays encrypted and cannot be accessed by anybody who has access to the device.
    One advantage probably with iOS is the closed system where it is really difficult to root the device.
    Above are some of the challenges with Operating Systems. You can get over them by using tooling that is available and by making the software development system more robust by adding reproducible builds.
Issues regarding secure coding Recommended best practices for individual developers Best practices for teams and enterprises
Storing secret keys Use SQL Cipher frequently Store secret keys in Android keychain management
MITM attacks Refresh tokens constantly Refresh tokens constantly
Leakage of data when logs are used. Give the standard technique for OAuth, token refreshment mechanisms, and try to anonymize the data. Do not send data over the network. Introduce periodic third-party external audits for adding an extra layer of precaution and security.
Maintaining security standards with new team members. Use the security SDK so that the basic tenets of security will be maintained. Regular security testing. Regular application audit.
Anything that goes in the APK is always known to everyone. Use tools around APK distribution and IPA distribution. Obfuscation of your code or use of ProGuard.

Common mistakes that developers and teams make: Small companies may not conduct external audits frequently, owing to lack of resources and/or bandwidth. This leads to data leaks, especially when logs are used. Developers and teams should try to use existing tools that suit their needs and test apps regularly to maintain security. They should also ensure that security standards are maintained across teams with updates, new apps, and new members. Development systems also need to be made more robust.

*This summary is written by Anwesha Sen. Reviewed by Chirayu Desai and Madhusudhan Sambojhu.

Comments

{{ gettext('Login to leave a comment') }}

{{ gettext('Post a comment…') }}
{{ gettext('New comment') }}
{{ formTitle }}

{{ errorMsg }}

{{ gettext('No comments posted yet') }}

Make a submission

Accepting submissions till 18 Oct 2021, 01:20 PM

Hosted by

Rootconf is a community-funded platform for activities and discussions on the following topics: Site Reliability Engineering (SRE). Infrastructure costs, including Cloud Costs - and optimization. Security - including Cloud Security. more

Supported by

Zeta® is in the business of providing a full-stack, cloud-native, API first neo-banking platform including a digital core and a payment engine for issuance of credit, debit and prepaid products that enable legacy banks and new-age fintech institutions to launch modern retail and corporate fintech p… more

Promoted

We’re the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. As a hyperscale cloud service provider, AWS provides access to highly advanced computing tools on rent for startups and SMEs at affordable prices. We help t… more
Omidyar Network India invests in bold entrepreneurs who help create a meaningful life for every Indian, especially the hundreds of millions of Indians in low-income and lower-middle-income populations, ranging from the poorest among us to the existing middle class. To drive empowerment and social i… more
Deep dives into privacy and security, and understanding needs of the Indian tech ecosystem through guides, research, collaboration, events and conferences. Sponsors: Privacy Mode’s programmes are sponsored by: more