Documentation

Go to Portal Website

Individual Control Reference

This section contains customer-facing reference pages for AppTego controls. Use it when you need details about a specific control after reviewing the higher-level Security Controls guides.

How To Read Control Pages

Each control page should answer these questions:

QuestionWhat to look for
What does it protect against?Summary, threat model, and recommended use cases.
Where does it run?Android, iOS, build-time, runtime, server-side, or hybrid behavior.
Who can use it?Plan availability and required platform version.
How do I roll it out?Portal configuration, rebuild requirements, live configuration support, and testing notes.
What can users notice?App behavior, messages, redirects, blocked actions, and compatibility considerations.

Detection Controls

Detection controls identify a threat condition and trigger a configured response action such as Log, Message, Redirect, or Terminate.

ControlPrimary platform focusUse when
Accessibility Service DetectionAndroidAccessibility services could observe or automate sensitive flows.
App Cloning DetectionAndroidMultiple app instances or cloned environments are a fraud or policy risk.
Debuggable DetectionAndroid, iOSRuntime debugging or inspection tools may be active in production.
Debugger DetectioniOSRuntime debugger attachment must be detected.
Developer Options DetectionAndroid, iOSDeveloper settings indicate a relaxed device security posture.
Device Lock DetectionAndroid, iOSUsers should have a passcode, PIN, pattern, or biometric lock configured.
Emulator DetectionAndroid, iOSApps should not run in emulators, simulators, or virtual test environments.
Hook DetectionAndroidRuntime instrumentation frameworks may be intercepting app behavior.
Hooking DetectioniOSRuntime method interception or injected libraries may be present.
Jailbreak DetectioniOSJailbroken devices are outside the expected OS security model.
Location Spoofing DetectionAndroid, iOSLocation data is part of fraud prevention, compliance, or access decisions.
Memory Tamper DetectioniOSRuntime memory modification must be detected.
Overlay DetectionAndroidTapjacking or overlay attacks could mislead users.
Proxy Usage DetectionAndroid, iOSIntercepting proxies could observe or alter API traffic.
Root DetectionAndroidRooted devices may expose app data or allow runtime modification.
Screen Capture DetectionAndroid, iOSScreenshot attempts should be detected.
Screen Mirroring DetectionAndroid, iOSSensitive screens should not be mirrored to external displays.
Screen Recording DetectionAndroidScreen recording sessions should be detected.
Third-Party Keyboard DetectionAndroid, iOSInput methods could capture sensitive text.
Time Tampering DetectionAndroid, iOSClock manipulation could affect sessions, trials, licenses, or certificates.
Unknown Sources DetectionAndroid, iOSSideloaded or unofficial installation paths are a policy risk.
USB Connection DetectionAndroidUSB debugging or connected-device workflows are not allowed.
Virtual App DetectionAndroidApp sandboxing or parallel-space environments may be used to bypass controls.
VPN DetectionAndroid, iOSNetwork routing through VPNs is a security or compliance concern.

Prevention And Hardening Controls

Prevention controls block, restrict, or harden behavior directly. Most changes require a new protected build.

ControlPrimary platform focusUse when
Autofill Suggestion PreventionAndroidSensitive forms should not expose values through autofill suggestions.
Android Backup PreventionAndroidApplication backup should be disabled for protected Android builds.
iOS Backup ProtectioniOSProtected AppTego-managed files should stay out of backup flows.
Clipboard ProtectionAndroid, iOSCopy and paste could leak secrets, PII, or regulated data.
Set Debuggable to FalseAndroid, iOSAndroid release builds must not be debuggable and debugger attachment should be blocked where supported.
Exported Components LockdownAndroidAndroid components should not be callable by other apps unless explicitly allowed.
File Sharing PreventioniOSFiles should stay out of system sharing surfaces.
Immutable PendingIntent EnforcementAndroidPendingIntent mutation could be abused by another app.
Keyboard Cache PreventioniOSSensitive text should not be stored in keyboard learning caches.
Keychain Accessibility HardeningiOSKeychain entries should use stricter accessibility classes.
Overlay PreventionAndroidOverlay windows should be blocked on sensitive screens.
Screen Recording PreventioniOSApp content should not be captured by screen recording.
Screenshot PreventioniOSSupported platform capture surfaces should reduce exposed app content.
Android Screen Capture ProtectionAndroidScreenshots, recordings, task switcher previews, and unsafe external display should be blocked.
Spotlight And Handoff SuppressioniOSApp data should not appear in Spotlight, Handoff, or related surfaces.
Storage Permission HardeningAndroidInternal files and SharedPreferences should not be world-accessible.
Storage EncryptioniOSSupported app-managed local data should use iOS Data Protection.
System Sharing SuppressioniOSSystem share sheets should not expose sensitive app content.
Task Hijacking PreventionAndroidActivity/task spoofing could redirect users into malicious flows.
Task Switcher Content ProtectionAndroid, iOSRecent-app previews should not show sensitive content.
WebView HardeningAndroid, iOSEmbedded web content needs stricter runtime defaults.

Integrity And Attestation Controls

Integrity controls help verify that the app, device, or protected configuration is trustworthy.

ControlPrimary platform focusUse when
App Tamper DetectionAndroid, iOSModified binaries or altered resources must be detected.
Apple App AttestiOSThe app instance should be attested by Apple services.
Enforce App UpdateAndroid, iOSUsers should move to a newer app version before continuing.
Enforce Latest ConfigurationAndroid, iOSDeployed apps should refuse stale required configuration.
Google Play IntegrityAndroidDevice and app integrity should be attested by Google Play.

Network Protection Controls

Network controls harden transport behavior and reduce exposure to interception or downgrade attacks.

ControlPrimary platform focusUse when
Certificate PinningAndroid, iOSAPI connections should only trust approved certificate keys.
Certificate TransparencyAndroidCertificate transparency policy should be enforced for configured domains.
Cleartext Traffic PreventionAndroidPlain HTTP should be blocked.
TLS 1.3 OnlyAndroid, iOSAll required services support TLS 1.3 and downgrade resistance is required.

Code Obfuscation Controls

Obfuscation controls make static analysis, reverse engineering, and binary modification harder. They are applied during protected builds.

ControlPrimary platform focusUse when
Anti-DisassemblyAndroidStatic analysis should be made more difficult.
Arithmetic EncodingAndroidSimple constants and arithmetic patterns should be harder to analyze.
Call IndirectionAndroidDirect call relationships should be harder to follow.
Control Flow ObfuscationAndroidExecution paths should be harder to reconstruct.
Dead Code InjectionAndroidAnalysis should be slowed with non-functional code paths.
Encrypt All CodeAndroidStronger code protection is required for high-risk builds.
Encrypt StringsAndroid, iOSHardcoded strings should not be readable in the binary.
Encrypt Unicode StringsiOSUTF-16 and wide-string content should not be readable in the binary.
Instruction SubstitutionAndroidEquivalent instruction sequences should reduce recognizable patterns.
Prevent All Debug LogsAndroidApp-authored debug logs should be removed from protected release builds.
Objective-C Selector IndirectioniOSObjective-C selector references should be harder to map through static analysis.
Rename ClassesAndroidClass names should not reveal implementation structure.
Rename Private MembersAndroidPrivate member and method names should not reveal implementation structure.
Strip BitcodeiOSLegacy bitcode sections should not ship in protected output.
Strip Debug InfoAndroidDebug metadata should not be present in release artifacts.
Strip Debug SymbolsiOSSymbol metadata should not aid reverse engineering.
Reduce Objective-C MetadataiOSObjective-C runtime metadata should reveal less app structure.
Reduce Swift Reflection MetadataiOSSwift type and field metadata should reveal less app structure.

Privacy And Telemetry Controls

These controls affect what device context is collected or how often configuration is refreshed. Enable them according to your privacy notice, legal basis, and tenant policy.

ControlPrimary platform focusUse when
Configuration Update FrequencyAndroid, iOSYou need to tune how often deployed apps check for configuration updates.
Store Device InformationAndroid, iOSDevice posture and metadata should be available in AppTego logs.
Store IP AddressAndroid, iOSIP address collection is required for security analytics or compliance.
Store Location InformationAndroid, iOSLocation context is required and covered by your privacy policy.

Build Configuration Controls

Build configuration controls change the output artifact AppTego creates.

ControlPrimary platform focusUse when
Include Simulator ArchitecturesiOSQA or CI needs simulator-compatible protected builds.
Include x86 ArchitecturesAndroidQA or CI needs emulator-compatible protected builds.

Choosing Controls

Start with the category guide that matches your goal, then open the linked control page for rollout notes and related controls.