Google’s Android Security & Privacy group has initiated the Android Partner Vulnerability Initiative (APVI) to regulate security issues, particularly to Android OEMs. The APVI is formulated to navigate remediation and deliver clarity to users about issues we have discovered at Google that influence device models dispatched by Android partners.
Android phones are created in such a way that several Original Equipment Manufacturers (OEM) assemble important elements for phones that are being dispatched. Virtually every leading tech company takes part in this, but Google is a company that has come under a lot of pressure for not being competent to protect its users as they might originally want to be. This is something that can have an extensive negative impact on the internet in common, which means that Google needs to start taking these security risks seriously, something that the tech giant has more or less been doing of late.
Improving Android OEM device security
Google publishes ASR reports in the Android Open Source Project (AOSP) based code through the Android Security Bulletins (ASB). These reports contain problems that could affect all Android-based devices. All Android partners must accept ASB changes to proclaim the current month’s Android security patch level (SPL). But until recently, they didn’t have a proper way to process Google-discovered security issues outside of AOSP code that is distinct to a much smaller set of specific Android OEMs. The APVI strives to close this gap, by putting in another layer of security for this targeted pair of Android OEMs.
The Android Security Rewards Program as well as the Google Play Security Rewards Program, both of which display exposures that are accumulated into Android Security Bulletins, that are then fixed in patches that are rolled out every month, Google is now nudging this procedure even further with the Android Partner Vulnerability Initiative.
The APVI covers Google-discovered dangers that could potentially affect the security posture of an Android device or its user and is aligned to ISO/IEC 29147:2018 Information technology – Security techniques – Vulnerability disclosure directions. This initiative covers a wide range of problems affecting device code that is not protected by Google.
This will implicate the team accountable for Android security checking out all OEMs that collaborate with Google and other Android phone manufacturers and making it in such a manner that significant defects in their components are identified. Each vulnerability that is found out will be documented individually along with the name of the manufacturer. With this Google will be able to guarantee that these types of situations happen far less often.