AC-19(5)
AC-19(5): Full Device or Container-based Encryption
Employ [one of "full-device encryption"/"container-based encryption"] to protect the confidentiality and integrity of information on [mobile devices on which to employ encryption are defined;].
Supplemental
Container-based encryption provides a more fine-grained approach to data and information encryption on mobile devices, including encrypting selected data structures such as files, records, or fields.
| CIA Levels | |
|---|---|
| Confidentiality | low |
| Integrity | low |
| Availability | unknown |
| Overlays |
|---|
| CMMC, Privacy (high), Privacy (low), Privacy (moderate) |
| CSF Categories |
|---|
| None |