3.1.19

  • Requirement

    Encrypt CUI on mobile devices and mobile computing platforms.

  • Discussion

    Organizations can employ full-device encryption or container-based encryption to protect the confidentiality of CUI on mobile devices and computing platforms. Container-based encryption provides a more fine-grained approach to the encryption of data and information including encrypting selected data structures such as files, records, or fields. See [NIST CRYPTO]. [23] Mobile devices and computing platforms include, for example, smartphones and tablets.

More Info

  • Family

    Access Control
  • DoD Scoring Methodology Points

    3
  • Related CMMC ID

  • Related NIST 800-53 ID

    AC-19(5)
  • Reference Documents

    • N/A

NIST 800-171A Assessment Guidance

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!