Mobile Device Security: Cloud and Hybrid Builds

Download the Practice Guide

The NCCoE has released the final version of NIST Cybersecurity Practice Guide SP 1800-4, Mobile Device Security: Cloud and Hybrid Builds. Use the buttons below to view this publication in its entirety or scroll down for links to a specific section.

Download PDF »Open Web Version »

Current Status

NIST incorporated public comments into this practice guide that was originally published in 2015.

Recognizing the interest in mobile device security, this final practice guide that is based upon an example solution using products that were architected and installed in 2015 is being released in its final version.

NIST SP 1800-4 was updated using input received from the public and has now been released as a final version.

To provide updated guidance, the NCCoE is developing two new mobile device security practice guides. Information on the upcoming practice guides can be found here.

NCCoE NIST Cybersecurity Practice Guide, Mobile Device Security: Cloud and Hybrid Builds was released on February 21, 2019. For ease of use, the draft guide is available to download or read in volumes:

  • SP 1800-4a: Executive Summary (PDF) (web page)
  • SP 1800-4b: Approach, Architecture, and Security Characteristics (PDF) (web page)
  • SP 1800-4c: How-To Guides (PDF) (web page)

Or you can download all volumes.

Read our two-page fact sheet for an overview of this project. For archival purposes, you may download the revised and original Project Descriptions.

Sign up for email alerts from the NCCoE to receive updates on our Mobile Device Security projects. If you have questions or would like to join our Community of Interest, please email the project team at


The NIST Cybersecurity Practice Guide “Mobile Device Security: Cloud & Hybrid Builds” demonstrates how commercially available technologies can meet your organization’s needs to help secure sensitive enterprise data accessed by and/or stored on employees’ mobile devices.

In our lab at the NCCoE, part of NIST, we built an environment based on typical mobile devices and an enterprise email, calendaring, and contact management solution. Additionally, we demonstrated how security can be supported throughout the mobile device lifecycle, including:

  • configure a device to be trusted by the organization
  • maintain adequate separation between the organization’s data and the employee’s personal data stored on or accessed from the mobile device
  • handle the de-provisioning of a mobile device that should no longer have enterprise access (e.g., device lost or stolen, employee leaves the company).

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

Microsoft logo