Under active development Content is continuously updated and improved

AC-19(5)Access Control For Mobile Devices

Technical

>Control Description

ACCESS CONTROL FOR MOBILE DEVICES | FULL DEVICE / CONTAINER-BASED ENCRYPTION The organization employs full-device encryption; container encryption to protect the confidentiality and integrity of information on organization-defined mobile devices.

>Supplemental Guidance

Container-based encryption provides a more fine-grained approach to the encryption of data/information on mobile devices, including for example, encrypting selected data structures such as files, records, or fields. Related controls: MP-5, SC-13, SC-28.

Ask AI

Configure your API key to use AI features.