AC-19(5)
      
        
        
      
      
        
  AC-19(5): Full Device or Container-based Encryption
      
      
        
        
      
    
  
    
      
  
    
    Employ [one of "full-device encryption"/"container-based encryption"] to protect the confidentiality and integrity of information on [mobile devices on which to employ encryption are defined;].
  
  
    
    
  Supplemental
Container-based encryption provides a more fine-grained approach to data and information encryption on mobile devices, including encrypting selected data structures such as files, records, or fields.
| CIA Levels | |
|---|---|
| Confidentiality | low | 
| Integrity | low | 
| Availability | unknown | 
| Overlays | 
|---|
| CMMC, Privacy (high), Privacy (low), Privacy (moderate) | 
| CSF Categories | 
|---|
| None |