AC-19(5)—Access Control For Mobile Devices
Technical
>Control Description
ACCESS CONTROL FOR MOBILE DEVICES | FULL DEVICE / CONTAINER-BASED ENCRYPTION The organization employs ☑full-device encryption; container encryption to protect the confidentiality and integrity of information on ⚙organization-defined mobile devices.
>Supplemental Guidance
Container-based encryption provides a more fine-grained approach to the encryption of data/information on mobile devices, including for example, encrypting selected data structures such as files, records, or fields. Related controls: MP-5, SC-13, SC-28.
Ask AI
Configure your API key to use AI features.