Member-only story
Android Hardening Guide

In this post, we’ll walk through how to harden your Android device utilizing leading industry security best practices like CIS benchmarks, globally recognized cryptographic standards, and privacy-improving applications. This is one that anyone with an Android device should read, so without further ado, let’s make a splash in your security.
Table of Contents
· 1. Why Harden Your Android Device?
· 2. Benchmarks & Baselines
∘ 2.1. CIS Benchmark
∘ 2.2. U.S. DoD STIG
· 3. Communications
∘ 3.1. Messaging
∘ 3.2. Emails
· 4. VPN
· 5. Other Apps & Protections
· 6. Checklist
· References
1. Why Harden Your Android Device?
At the start of 2022, researchers at Proofpoint (2022) detected a 500% jump in mobile malware delivery attempts in Europe. It’s no secret that hackers are noticing the increasing value of mobile devices in an expanding remote-work world and taking action. Despite this knowledge of increasing attacks, it’s reported that over 80% of Android devices were susceptible to at least 1/25 vulnerabilities. This is no small number and the…