Mobile Device Security: Cloud and Hybrid Builds

Download the Practice Guide

The NCCoE has released the final version of NIST Cybersecurity Practice Guide SP 1800-4, Mobile Device Security: Cloud and Hybrid Builds. Use the buttons below to view this publication in its entirety or scroll down for links to a specific section.

Download PDF »Open Web Version »

Current Status

The NIST Cybersecurity Practice Guide released a final version of the NIST Cybersecurity Practice Guide, Mobile Device Security: Cloud and Hybrid Builds on February 22, 2019. For ease of use, the draft guide is available to download or read in volumes:

  • SP 1800-4a: Executive Summary (PDF) (web page)
  • SP 1800-4b: Approach, Architecture, and Security Characteristics (PDF) (web page)
  • SP 1800-4c: How-To Guides (PDF) (web page)

Or you can download all volumes.

Read our two-page fact sheet for an overview this project. For archival purposes, you may download the revised and original Project Descriptions.

Sign up for email alerts from the NCCoE to receive updates on our Mobile Device Security projects. If you have questions or would like to join our Community of Interest, please email the project team at


The NIST Cybersecurity Practice Guide “Mobile Device Security: Cloud & Hybrid Builds” demonstrates how commercially available technologies can meet your organization’s needs to secure sensitive enterprise data accessed by and/or stored on employees’ mobile devices.

In our lab at the NCCoE, part of the National Institute of Standards and Technology (NIST), we built an environment based on typical mobile devices and an enterprise email, calendaring, and contact management solution. Additionally, we demonstrated how security can be supported throughout the mobile device lifecycle, including:

  • configure a device to be trusted by the organization
  • maintain adequate separation between the organization’s data and the employee’s personal data stored on or accessed from the mobile device
  • handle the de-provisioning of a mobile device that should no longer have enterprise access (e.g., device lost or stolen, employee leaves the company.

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

Intel logo
Microsoft logo
Symantec logo