IBM Cloud Docs
AC-19 (5) - Full Device or Container-based Encryption

AC-19 (5) - Full Device or Container-based Encryption

Control requirements

AC-19 (5) - 0

Employ [IBM Assignment: file level, full disk/device, or both] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].

NIST supplemental guidance

Container-based encryption provides a more fine-grained approach to data and information encryption on mobile devices, including encrypting selected data structures such as files, records, or fields.