5.13.4—Mobile Device Integrity
>Control Description
Managing system integrity on limited function mobile operating systems may require methods and technologies significantly different from traditional full-featured operating systems. In many cases, the requirements of Section 5.10 of the CJIS Security Policy cannot be met with a mobile device without the installation of a third-party MDM, application, or supporting service infrastructure.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.