Title
FULL DEVICE / CONTAINER-BASED ENCRYPTION
Description
The organization employs [Selection: full-device encryption; container encryption] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].
Supplemental
Container-based encryption provides a more fine-grained approach to the encryption of data/information on mobile devices, including for example, encrypting selected data structures such as files, records, or fields.
Reference Item Details
Related: MP-5,SC-13,SC-28
Parent Title: ACCESS CONTROL FOR MOBILE DEVICES
Baseline Impact: MODERATE,HIGH