Introduction
Mobile applications are often a crux for controlling consumer IoT. Be it smart home devices or connected vehicles, mobile applications are a desirable target to attack and be kept secure. In Chapter 5, Exploiting IoT Mobile Applications, exploitation of mobile applications was covered from an offensive perspective. This chapter will provide mobile application security defensive controls used to protect from common attack vectors. It is important to note that this chapter is by no means exhaustive when it comes to mobile security best practices as full books are written on this subject alone. It is encouraged to reference supplemental reading for more in-depth understanding of certain controls and best practices described in this chapter. Where appropriate, examples for Android and iOS will be given throughout recipes. As per OWASP's Mobile Security Project (https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Controls), the top 10 mobile controls...