AC-19(05)—Access Control for Mobile Devices | Full Device or Container-based Encryption
Moderate
>Control Description
Employ ☑full-device encryption; container-based encryption to protect the confidentiality and integrity of information on ⚙organization-defined mobile devices.
>Discussion
Container-based encryption provides a more fine-grained approach to data and information encryption on mobile devices, including encrypting selected data structures such as files, records, or fields.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.