AC-19(5)—Access Control for Mobile Devices (5)
>Control Description
Employ full-device encryption to protect the confidentiality and integrity of information on full- and limited-feature operating system mobile devices authorized to process, store, or transmit CJI.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.