Skip to content

Mobile Hardening Guide

Mobile Device Hardening: Android | iOS

Ensure the safety and security of your mobile devices with these guidelines and recommendations tailored for Android and iOS systems. Additional resources are available at the DFP Checklists.

There is a larger Section that is broader than just mobile devices.

Threat Model Context

Some advice in this guide (and common security guidance) may be overly cautious for everyday users. A group of CISOs published an open letter critiquing outdated security advice including:

  • Public USB chargers ("juice jacking") — No verified cases affecting everyday users in the wild
  • Disabling Bluetooth/NFC — Wireless exploits are extraordinarily rare and require specialized hardware
  • Public WiFi avoidance — Modern encryption makes large-scale compromises exceedingly rare

However, for high-threat environments (military operations, journalists in conflict zones, targeted individuals), these precautions may still be warranted. Know your threat model and adjust accordingly.


Official Security Guidance

These guides from government cybersecurity agencies provide authoritative recommendations:

SourceDocumentDescription
NSAMobile Device Best Practices (PDF)One-page infographic covering essential mobile security practices
CISAMobile Communications Best Practice Guidance (Nov 2025)Latest guidance addressing Salt Typhoon telecom intrusions
CISAFederal Mobile Workplace Security (2024)Comprehensive enterprise mobile security guide
NISTSP 800-124 Rev. 2Guidelines for Managing the Security of Mobile Devices in the Enterprise
CISGoogle Android BenchmarksDetailed configuration benchmarks for Android

Critical CISA Recommendations (2024-2025)

CISA's December 2024 guidance was issued in response to Chinese state-sponsored threat actors (Salt Typhoon) compromising U.S. telecom infrastructure. Key recommendations:

Use End-to-End Encrypted Messaging

CISA strongly recommends using encrypted messaging apps like Signal for all communications.

  • Signal - Cross-platform, supports encrypted voice/video calls, group chats, disappearing messages
  • Available: iOS | Android

Avoid SMS for Multi-Factor Authentication

Critical Change

CISA now advises: Do NOT use SMS for multi-factor authentication. SMS is vulnerable to SIM-swapping attacks, which increased by 1,055% in the UK and 240% globally in 2024.

Use instead:

  • Hardware security keys (FIDO2/WebAuthn) — Best option
  • FIDO passkeys
  • Authenticator apps (Aegis, 2FAS)

VPN Guidance

CISA's Position on Personal VPNs

"Do not use a personal virtual private network (VPN). Personal VPNs simply shift residual risks from your internet service provider (ISP) to the VPN provider, often increasing the attack surface."

This applies to commercial VPN services. Enterprise/organizational VPNs for accessing work resources remain appropriate.

Keep Hardware Current

"Opt for the latest hardware version from your cell phone manufacturer, as newer hardware often incorporates critical security features that older hardware cannot support."

Software updates alone cannot provide maximum security benefits without current hardware security features.


NSA Mobile Device Best Practices

Key highlights from the NSA guide:

Essential Practices

PracticeRecommendation
Lock ScreenUse 6+ digit PIN; enable wipe after 10 failed attempts
Auto-LockSet device to lock after 5 minutes of inactivity
Weekly RebootRestart your device at least once per week
App ManagementInstall minimal apps; only from official stores
JailbreakingNever jailbreak or root your device
Software UpdatesEnable automatic updates for OS and apps

Physical Security

  • Maintain physical control of your device at all times
  • Consider a protective case that muffles the microphone
  • Cover your camera when not in use
  • For sensitive conversations, consider voice-encrypting apps

Comprehensive Security Checklist

Device Configuration

  • [ ] Enable full device encryption
  • [ ] Set strong PIN/password (6+ digits, not sequential or birthdates)
  • [ ] Enable biometric authentication (prefer non-index fingers for fingerprint)
  • [ ] Configure auto-lock (5 minutes or less)
  • [ ] Enable "wipe after failed attempts" (10 attempts)
  • [ ] Disable lock screen notifications for sensitive apps

Software & Updates

  • [ ] Enable automatic OS updates
  • [ ] Enable automatic app updates
  • [ ] Remove unused applications
  • [ ] Review and minimize app permissions regularly
  • [ ] Only install apps from official stores (App Store, Google Play, F-Droid)

Authentication & Accounts

  • [ ] Use a password manager (Bitwarden, KeePass)
  • [ ] Enable hardware-based MFA where possible (YubiKey, passkeys)
  • [ ] Use authenticator apps instead of SMS for 2FA
  • [ ] Set a SIM PIN to prevent unauthorized SIM changes
  • [ ] Contact carrier to add account PIN/passphrase for porting protection

Communication

  • [ ] Use end-to-end encrypted messaging (Signal, Element)
  • [ ] Disable SMS fallback in messaging apps where possible
  • [ ] Use encrypted email (ProtonMail)

Privacy

  • [ ] Disable Advertising ID / Reset it regularly
  • [ ] Turn off personalized ads
  • [ ] Disable always-on virtual assistants (Siri, Google Assistant)
  • [ ] Review location permissions; use "While Using" instead of "Always"
  • [ ] Disable location services for apps that don't need it

iOS-Specific Hardening

Lockdown Mode (For High-Risk Users)

Apple Lockdown Mode is an extreme protection for users who may be targeted by sophisticated cyberattacks (journalists, activists, government officials).

When enabled, Lockdown Mode:

  • Blocks most message attachment types except images, video, and audio
  • Disables link previews in Messages
  • Blocks incoming FaceTime calls from unknown contacts
  • Prevents connection to non-secure Wi-Fi networks
  • Disables 2G/3G cellular (iPhone/iPad)
  • Requires device unlock to connect accessories
  • Blocks configuration profiles and MDM enrollment

Enable: Settings → Privacy & Security → Lockdown Mode → Turn On

WARNING

Lockdown Mode does not clean existing infections. It's a preventive measure, not antivirus. It also creates a detectable fingerprint that may identify you as a high-value target.

iOS Security Settings

SettingLocationRecommendation
Stolen Device ProtectionFace ID & PasscodeEnable
USB AccessoriesFace ID & PasscodeRequire unlock
Significant LocationsPrivacy → Location Services → System ServicesDisable
iPhone AnalyticsPrivacy → AnalyticsDisable all
Apple AdvertisingPrivacy → Apple AdvertisingDisable personalized ads
Safari Fraud WarningSafariEnable
Hide IP AddressSafari → PrivacyEnable

Android-Specific Hardening

Stock Android Security

SettingLocationRecommendation
Google Play ProtectPlay Store → Profile → Play ProtectEnable
Find My DeviceSettings → SecurityEnable
App PermissionsSettings → Apps → PermissionsReview and minimize
Unknown SourcesSettings → SecurityKeep disabled
Developer OptionsSettings → About → Build NumberKeep disabled
USB DebuggingDeveloper OptionsKeep disabled

Privacy-Focused Android Operating Systems

For maximum privacy and security, consider replacing stock Android with a hardened alternative:

OSFocusBest ForDevice Support
GrapheneOSMaximum securitySecurity-focused usersGoogle Pixel only
CalyxOSPrivacy + usabilityTransition from stock AndroidPixel, some others
LineageOSCustomizationWide device supportMany devices

GrapheneOS Advantages:

  • Hardened kernel and memory allocation
  • Sandboxed Google Play Services (optional, no privileged access)
  • Vanadium browser (hardened Chromium without Google tracking)
  • Fastest security updates among privacy ROMs
  • Required for hardware security features (Titan M chip)

CalyxOS Advantages:

  • More beginner-friendly
  • Includes microG (Google Services alternative) by default
  • Tor integration built-in
  • Broader device support than GrapheneOS

F-Droid: Alternative App Store

F-Droid is an open-source app repository focused on privacy:

Recommended F-Droid Apps:

  • Aegis - 2FA authenticator
  • KeePassDX - Password manager
  • Element - Matrix messenger
  • TrackerControl - Monitor app tracking
  • Insular - App isolation
  • Aurora Store - Privacy-respecting Google Play frontend

SIM Security & Swapping Prevention

SIM swapping attacks increased dramatically in 2024 (1,055% in UK, 240% globally). Even eSIMs are not immune to sophisticated attacks.

Protection Measures

  1. Set a SIM PIN

    • Requires PIN to use SIM in another device
    • iOS: Settings → Cellular → SIM PIN
    • Android: Settings → Security → SIM card lock
  2. Add Carrier Account Security

    • Contact your carrier to add a unique passcode/passphrase
    • Request a "port freeze" or "number lock"
    • Ask about their SIM swap verification procedures
  3. Never Use SMS for High-Value 2FA

    • Banking, crypto, email should use authenticator apps or hardware keys
    • SMS 2FA is better than nothing, but vulnerable
  4. Monitor for Warning Signs

    • Sudden loss of cellular service
    • Unexpected "SIM changed" notifications
    • Unable to make/receive calls or texts
  5. eSIM Considerations

    • Enable biometric authentication for eSIM changes
    • eSIMs eliminate physical SIM theft but can still be ported
    • GSMA eSIM Security Framework provides certification standards

Password Management

AppPlatformsNotes
BitwardeniOS, Android, Desktop, WebOpen-source, self-hostable
KeePassXC / KeePassDXCross-platformOffline, open-source

Avoid: LastPass (multiple breaches)

Two-Factor Authentication

AppPlatformsNotes
YubiKeyHardwareBest security, FIDO2/WebAuthn
AegisAndroidOpen-source, encrypted backups
2FASiOS, AndroidOpen-source, browser extension
OTP AuthiOSiCloud sync

Avoid:

  • SMS-based 2FA (vulnerable to SIM swapping)
  • Google Authenticator (sync not end-to-end encrypted)
  • Authy (requires phone number, not open-source)

Secure Communication

AppPurposeNotes
SignalMessagingCISA-recommended, E2EE
ElementMatrix clientDecentralized, E2EE
ProtonMailEmailSwiss-based, E2EE

Security Tools

AppPurposePlatform
MalwarebytesMalware scanningiOS, Android
TrackerControlApp tracking monitorAndroid (F-Droid)
CryptomatorFile encryptioniOS, Android
OpenKeychainPGP key managementAndroid

Side-Loading Apps (Android)

Risks and Benefits

Benefits:

  • Access to open-source apps not on Play Store
  • Apps without Google tracking
  • Greater control over app sources

Risks:

  • Potential malware exposure
  • No automatic security scanning
  • May void warranty

Safe Side-Loading Practices

  1. Only side-load from trusted sources (F-Droid, app developer's official site)
  2. Verify APK signatures/checksums when available
  3. Use a sandboxed environment if possible
  4. Keep "Install unknown apps" disabled by default
  5. Enable only for specific app installation, then disable

Enterprise Considerations

For organizations managing mobile devices, refer to:

Key enterprise capabilities:

  • Mobile Device Management (MDM) - Centralized policy enforcement
  • Mobile Application Vetting (MAV) - App security assessment
  • Mobile Threat Defense (MTD) - Real-time threat detection

References & Further Reading

Government Sources

Privacy Resources

IrregularChat Community Wiki