AC-19 Access Control For Portable And Mobile Devices

Access Control

Low Moderate High

Description

The organization: (i) establishes usage restrictions and implementation guidance for organization-controlled portable and mobile devices; and (ii) authorizes, monitors, and controls device access to organizational information systems.

Supplemental Guidance

Portable and mobile devices (e.g., notebook computers, personal digital assistants, cellular telephones, and other computing and communications devices with network connectivity and the capability of periodically operating in different physical locations) are only allowed access to organizational information systems in accordance with organizational security policies and procedures. Security policies and procedures include device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), configuration management, scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). Protecting information residing on portable and mobile devices (e.g., employing cryptographic mechanisms to provide confidentiality and integrity protections during storage and while in transit when outside of controlled areas) is covered in the media protection family. Related security controls: MP-04, MP-05.

Changes from Rev 4

Adds text 'to include when such devices are outside of controlled areas'

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

A.8.1

ISO 27002:2022

7.98.1

COBIT 2019

DSS05

CIS Controls v8

CIS 4.11CIS 4.12

PCI DSS v4.0.1

1.5

CSA CCM v4

UEM-01UEM-13

CSA AICM v1

UEM-01UEM-13

NIS2 Directive

Art. 21(2)(i)

MAS TRM

9

BSI IT-Grundschutz

CON.7ORP.4

ANSSI

Hygiene.19SecNumCloud.10.6

FINMA Circular 2023/1

IV.B.d(59)IV.C(64)

OSFI B-13

B-13.3.2

EU GDPR

Art.32(1)(a)Art.32(1)(b)

EU DORA

Art.9(4)(a)Art.9(4)(c)

BIO2

7.98.1

RBI CSF

Annex1.8Annex1.12

FISC Security Guidelines

FISC.T10

HKMA TM-E-1

TME1.10.2TME1.8.5

MLPS 2.0

8.3

SAMA CSF

3.13.33.8

NCA ECC

2-6

UAE IA

T9

CBB TM

TM-6

Qatar NIA

AC

CBUAE

CR-4

CBE CSF

CTO-1CTO-7

SA JS2

JS2-7.1

CBN CSF

Part3.2

BoG CISD

CISD-VIII

BoM CTRM

3.12

CPMI-IOSCO PFMI

CG.PR

FFIEC IS

II.C.15(c)

NYDFS 500

500.7

ECB CROE

CROE.2.3.5

SEBI CSCRF

PR.ES

BOT Cyber Resilience

Ch2.6Ch9.1

CMMC 2.0

AC

Solvency II

EIOPA-ICT-4.6

Lloyd's Minimum Standards

MS8.3

NAIC Insurance Data Security

4-access

FCA SYSC 13

SYSC 13.7.3

HITRUST CSF v11

01.b01.d05.c

FDA 21 CFR Part 11

§11.10(h)

ISO 27799

11.26.3

NHS DSPT

NDG-9.7

ISO 17799 (legacy)

11.7.1

COBIT 4.1 (legacy)

None.