Under active development Content is continuously updated and improved

AC-19(05)Access Control for Mobile Devices | Full Device or Container-based Encryption

Moderate

>Control Description

Employ full-device encryption; container-based encryption to protect the confidentiality and integrity of information on organization-defined mobile devices.

>Discussion

Container-based encryption provides a more fine-grained approach to data and information encryption on mobile devices, including encrypting selected data structures such as files, records, or fields.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.