Lesson 8.4 — Application sandboxing: how app store controls work and what to check for Option B

This lesson explains how application sandboxing works as the underlying mechanism behind Option B (application allow-listing and app store controls) in the Cyber Essentials Malware Protection control.

What You'll Be Able to Do

By the end of this lesson, you will be able to:

  • explain what application sandboxing is and how it relates to Option B under Cyber Essentials 2026
  • review trusted app sources and app store controls
  • check app permission controls
  • identify sideloading
  • rooting and jailbreaking risks
  • review MDM/MAM controls

Why This Matters

The 2026 Cyber Essentials scheme recognises two malware protection options: anti-malware software (Option A, for Windows and macOS) and application allow-listing including app store controls (Option B, for all device types). Sandboxing is not a separate third option — it is the technical foundation that makes Option B effective on mobile and tablet platforms.

The most common problems are:

  • assuming mobile devices are automatically safe;
  • relying on sandboxing while allowing sideloading from unknown sources;
  • allowing rooted or jailbroken devices;
  • allowing unsupported OS versions;

The Core Rule

Cyber Essentials 2026 has two malware protection options: anti-malware software (Option A, for Windows and macOS devices) and application allow-listing including app store controls (Option B, for all device types including mobiles and tablets).

Sandboxing is not a separate third option. It is the underlying mechanism that makes Option B effective on mobile platforms — iOS and Android restrict what apps can access by design, which is sandboxing in practice.

What the CE Assessor Looks For

A strong position shows:

  • devices using sandboxing are identified;
  • operating systems are supported and updated;
  • apps come from trusted or approved sources;
  • sideloading is blocked or controlled;
  • rooted or jailbroken devices are blocked from organisational access;
  • app permissions are restricted or reviewed;

Common Mistakes

  • assuming mobile devices are automatically safe;
  • relying on sandboxing while allowing sideloading from unknown sources;
  • allowing rooted or jailbroken devices;
  • allowing unsupported OS versions;
  • ignoring BYOD;
  • ignoring app permissions;

Copy This

Keep this rule visible:

For mobile devices using Option B, prove that only approved apps can be installed and that the platform restrictions preventing unknown code from accessing organisational data, other apps, sensitive device features or the local network are intact.

Quick Checklist

Before moving on, make sure you can say yes to these:

  • [ ] How many malware protection options does Cyber Essentials 2026 formally recognise?
  • [ ] What does application sandboxing do on a mobile device?
  • [ ] Name four resource types that sandboxing should restrict.
  • [ ] Why is sideloading a risk?
  • [ ] Why are rooted or jailbroken devices a problem?

Your Action

Do this now — it takes 10–20 minutes.

Check app store settings on all mobile devices. Confirm that only official app store installations are permitted. Record in Section MP.

Key Takeaway

For mobile devices using Option B, prove that only approved apps can be installed and that the platform restrictions preventing unknown code from accessing organisational data, other apps, sensitive device features or the local network are intact.

Your Workbook Activity

Complete: Application sandboxing and mobile app protection review record

Next Lesson

In the next lesson: Final malware protection review: coverage, evidence, exceptions and common failures