About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
AC-19 (5) - Full Device or Container-based Encryption
Control requirements
AC-19 (5) - 0
Employ [IBM Assignment: file level, full disk/device, or both] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].
NIST supplemental guidance
Container-based encryption provides a more fine-grained approach to data and information encryption on mobile devices, including encrypting selected data structures such as files, records, or fields.