5.13.7—Mobile Device Access Control
>Control Description
Due to the technical methods used for identification and authentication on many limited-feature mobile operating systems, achieving compliance may require many different components.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.