STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

AC-19

Access ControlRev 5organization

Access Control for Mobile Devices

Baselines:LowModerateHigh

Control Statement

a. Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas; and b. Authorize the connection of mobile devices to organizational systems.

Supplemental Guidance

A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection; possesses local, non-removable or removable data storage; and includes a self-contained power source. Mobile device functionality may also include voice communication capabilities, on-board sensors that allow the device to capture information, and/or built-in features for synchronizing local data with remote locations. Examples include smart phones and tablets. Mobile devices are typically associated with a single individual. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of notebook/desktop systems, depending on the nature and intended purpose of the device. Protection and control of mobile devices is behavior or policy-based and requires users to take physical action to protect and control such devices when outside of controlled areas. Controlled areas are spaces for which organizations provide physical or procedural controls to meet the requirements established for protecting information and systems. Due to the large variety of mobile devices with different characteristics and capabilities, organizational restrictions may vary for the different classes or types of such devices. Usage restrictions and specific implementation guidance for mobile devices include configuration management, device identification and authentication, implementation of mandatory protective software, scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware. Usage restrictions and authorization to connect may vary among organizational systems. For example, the organization may authorize the connection of mobile devices to its network and impose a set of usage restrictions, while a system owner may withhold authorization for mobile device connection to specific applications or impose additional usage restrictions before allowing mobile device connections to a system. Adequate security for mobile devices goes beyond the requirements specified in [AC-19](#ac-19) . Many safeguards for mobile devices are reflected in other controls. [AC-20](#ac-20) addresses mobile devices that are not organization-controlled.

Related Controls (22)

AC-3AC-4AC-7AC-11AC-17AC-18AC-20CA-9CM-2CM-6IA-2IA-3MP-2MP-4MP-5MP-7PL-4SC-7SC-34SC-43SI-3

CCI Identifiers (12)

CCI-000082The organization establishes usage restrictions for organization-controlled mobile devices.CCI-000083Establish implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas.CCI-000084Authorize connection of mobile devices to organizational systems.CCI-000085The organization monitors for unauthorized connections of mobile devices to organizational information systems.CCI-000086The organization enforces requirements for the connection of mobile devices to organizational information systems.CCI-000087The organization disables information system functionality that provides the capability for automatic execution of code on mobile devices without user direction.CCI-000088The organization issues specially configured mobile devices to individuals traveling to locations that the organization deems to be of significant risk in accordance with organizational policies and procedures.CCI-000089The organization applies organization-defined inspection and preventative measures to mobile devices returning from locations that the organization deems to be of significant risk in accordance with organizational policies and procedures.

Linked STIG Checks (0)

No STIG checks reference this control.

SI-4
CCI-002325Establish configuration requirements for organization-controlled mobile devices, to include when such devices are outside of controlled areas.
CCI-001456The organization defines locations that the organization deems to be of significant risk in accordance with organizational policies and procedures.
CCI-001457The organization defines inspection and preventative measures to be applied on mobile devices returning from locations that the organization deems to be of significant risk in accordance with organizational policies and procedures.
CCI-002326Establish connection requirements for organization-controlled mobile devices, to include when such devices are outside of controlled areas.