AC-19(5)
AC-19(5): Full Device / Container-based Encryption
The organization employs [one of "full-device encryption"/"container encryption"] to protect the confidentiality and integrity of information on [one of ].
Supplemental
Container-based encryption provides a more fine-grained approach to the encryption of data/information on mobile devices, including for example, encrypting selected data structures such as files, records, or fields.
CIA Levels | |
---|---|
Confidentiality | moderate |
Integrity | moderate |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |