3.1.19[a]

  • Determination Statement

    Mobile devices and mobile computing platforms that process, store, or transmit CUI are identified.

  • Requirement

    Encrypt CUI on mobile devices and mobile computing platforms.

  • Requirement Discussion

    Organizations can employ full-device encryption or container-based encryption to protect the confidentiality of CUI on mobile devices and computing platforms. Container-based encryption provides a more fine-grained approach to the encryption of data and information including encrypting selected data structures such as files, records, or fields. See [NIST CRYPTO]. [23] Mobile devices and computing platforms include, for example, smartphones and tablets.

More Info

  • Family

    Access Control
  • DoD Scoring Methodology Points

    3

  • Related NIST 800-171 ID

  • Related CMMC ID

  • Related NIST 800-53 ID

    AC-19(5)

  • Reference Documents

    • N/A

NIST 800-171A Assessment Guidance

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!