Mobile Device Management

Mobile device management enables an enterprise to manage the security of mobile endpoints similarly to they way that desktops are managed. The security features include locking or wiping the device if compromised, pushing software updates to the device, and requiring certain security features be enabled before allowing a device to connect to the corporate network.

Cloud Controls Matrix (CCM) Data

IS-32 | Information Security | Portable / Mobile Devices

Control Specification +-

Policies and procedures shall be established and measures implemented to strictly limit access to sensitive data from portable and mobile devices, such as laptops, cell phones, and personal digital assistants (PDAs), which are generally higher-risk than non-portable devices (e.g., desktop computers at the organization?s facilities).

Architectural Relevance +-

PhysicalNetworkComputeAppData
True True True True True

Corp Gov Relevance +-

Corp Gov Relevance
True

Cloud Service Delivery Model Applicability +-

SaaSPaaSIaaS
True True True

Supplier Relationship +-

Service ProviderTenant / Consumer
True True

Scope Applicability +-

COBIT 4.1HIPAA / HITECH ActISO/IEC 27001-2005

DS5.11
DS5.5

45 CFR 164.310 (d)(1)

A.7.2.1
A.10.7.1
A.10.7.2
A.10.8.3
A.11.7.1
A.11.7.2
A.15.1.4

NIST SP800-53 R3FedRAMP (Final 2012) Low ImpactFedRAMP (Final 2012) Moderate ImpactPCI DSS v2.0

AC-17
AC-18
AC-19
MP-2
MP-4
MP-6

NIST SP 800-53 R3 AC-17
NIST SP 800-53 R3 AC-18
NIST SP 800-53 R3 AC-19
NIST SP 800-53 R3 MP-2
NIST SP 800-53 R3 MP-6

NIST SP 800-53 R3 AC-17
NIST SP 800-53 R3 AC-17 (1)
NIST SP 800-53 R3 AC-17 (2)
NIST SP 800-53 R3 AC-17 (3)
NIST SP 800-53 R3 AC-17 (4)
NIST SP 800-53 R3 AC-17 (5)
NIST SP 800-53 R3 AC-17 (7)
NIST SP 800-53 R3 AC-17 (8)
NIST SP 800-53 R3 AC-18
NIST SP 800-53 R3 AC-18 (1)
NIST SP 800-53 R3 AC-18 (2)
NIST SP 800-53 R3 AC-19
NIST SP 800-53 R3 AC-19 (1)
NIST SP 800-53 R3 AC-19 (2)
NIST SP 800-53 R3 AC-19 (3)
NIST SP 800-53 R3 MP-2
NIST SP 800-53 R3 MP-2 (1)
NIST SP 800-53 R3 MP-4
NIST SP 800-53 R3 MP-4 (1)
NIST SP 800-53 R3 MP-6
NIST SP 800-53 R3 MP-6 (4)

9.7
9.7.2
9.8
9.9
11.1
12.3

BITS Shared Assessments SIG v6.0BITS Shared Assessments SIG v5.0GAPP (Aug 2009)

G.11, G12, G.20.13, G.20.14

1.2.6
3.2.4
8.2.6

Jericho ForumNERC CIP

All

CIP-007-3 - R7.1

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Information Security (IS) | ID #IS-32.1

Are Policies and procedures established and measures implemented to strictly limit access to sensitive data from portable and mobile devices, such as laptops, cell phones, and personal digital assistants (PDAs), which are generally higher-risk than non-portable devices (e.g., desktop computers at the provider organization?s facilities)?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.11
COBIT 4.1 DS5.5

45 CFR 164.310 (d)(1)

A.7.2.1
A.10.7.1
A.10.7.2
A.10.8.3
A.11.7.1
A.11.7.2
A.15.1.4

NIST SP800-53 R3 AC-17
NIST SP800-53 R3 AC-18
NIST SP800-53 R3 AC-19
NIST SP800-53 R3 MP-2
NIST SP800-53 R3 MP-4
NIST SP800-53 R3 MP-6

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 9.7
PCI DSS v2.0 9.7.2
PCI DSS v2.0 9.8
PCI DSS v2.0 9.9
PCI DSS v2.0 11.1
PCI DSS v2.0 12.3

SIG v6.0:G.11, G12, G.20.13, G.20.14

GAPP Ref 1.2.6
GAPP Ref 3.2.4
GAPP Ref 8.2.6

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True