Documentation

Go to Portal Website

Network Protection

Network protection controls harden how protected apps connect to backend services. They reduce exposure to interception, downgrade attacks, cleartext traffic, unexpected certificate chains, and policy-violating network conditions.

Network policy can affect login, payments, analytics, support tools, and third-party SDKs. Coordinate changes with backend, infrastructure, mobile, QA, and support teams before strict production enforcement.

Network Control Matrix

ControlPlatformsMinimum planExecutionUse when
Certificate PinningAndroid, iOSEnterpriseRuntime with packaged policyAPI connections should only trust approved certificate keys.
Certificate TransparencyAndroidEnterpriseBuild-time policy with runtime enforcementAndroid TLS certificates should meet transparency policy for protected domains.
Cleartext Traffic PreventionAndroidEnterpriseBuild-time hardeningPlain HTTP should be blocked in protected builds.
TLS 1.3 OnlyAndroid, iOSEnterpriseRuntime policy on supported platform APIsRequired services support TLS 1.3 and downgrade resistance is required.
Proxy Usage DetectionAndroid, iOSTeamRuntime detectionIntercepting proxies should be detected and logged or blocked.
ProfileRecommended controls
Baseline production appKeep all endpoints on HTTPS, enable Proxy Usage Detection in Log mode where available, and add Cleartext Traffic Prevention for Enterprise Android builds.
Regulated or high-value APICertificate Pinning, TLS 1.3 Only where endpoint and OS support is confirmed, Proxy Usage Detection, and clear customer messaging for blocked connections.
Strict Android certificate policyCertificate Pinning plus Certificate Transparency for production API domains.
Enterprise-managed deploymentValidate certificate pinning and proxy policy against approved network inspection requirements before enforcement.

Rollout Guidance

  1. Inventory every backend, CDN, authentication, analytics, and third-party endpoint used by the app.
  2. Confirm TLS versions, certificate authorities, certificate rotation process, and fallback endpoints.
  3. Enable network controls in Development or Staging first.
  4. Test normal traffic, expired or wrong certificates, captive portals, VPN/proxy conditions, and managed devices.
  5. Coordinate certificate and TLS changes with backend, infrastructure, and support teams.
  6. Enforce strict responses only after the app release and backend certificate plan are aligned.

Operational Checklist

AreaWhat to confirm
Domain inventoryProduction APIs, authentication, payments, CDN, analytics, support, and third-party endpoints are known.
Certificate lifecycleRotation dates, backup certificates, and ownership are documented.
Test coverageNormal traffic and expected failure cases are validated in Staging.
User messagingBlocked users receive clear guidance where appropriate.
Enterprise networksManaged proxy or inspection requirements are understood before enforcement.

Coverage Notes

TLS 1.3 Only applies only where the platform and networking APIs support enforcement. Validate iOS 13+ and Android API 29+ behavior, and separately configure third-party HTTP clients or native networking stacks when they bypass platform defaults.

Certificate Pinning and Certificate Transparency are domain-policy controls. Keep backend, CDN, disaster-recovery, and certificate rotation plans aligned with the protected app release schedule before enforcing strict responses.