13.6: Encrypt Mobile Device Data

Utilize approved cryptographic mechanisms to protect enterprise data stored on all mobile devices.

Asset Type

Security Function

Implementation Groups

Data

Protect

1, 2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

  • Sub-control 2.1: Maintain an Inventory of Authorized Software

  • Sub-control 5.1: Establish Secure Configurations

Inputs

  1. The list of approved mobile devices (derived from endpoint inventory; sub-control 1.4)

  2. The list of approved mobile device encryption software (ideally derived from authorized software list; sub-control 2.1)

  3. For each software in Input 2, the approved software configuration policy.

Operations

  1. For each mobile device in Input 1, determine if any of the approved encryption software from Input 2 is installed.

  2. For each mobile device with installed approved encryption software, collect the software configuration information and compare it to the approved configuration policy (Input 3).

Measures

  • M1 = List of approved mobile devices

  • M2 = Count of M1

  • M3 = List of approved mobile devices with approved encryption software installed

  • M4 = Count of M3

  • M5 = List of approved mobile devices without approved encryption software installed

  • M6 = Count of M5

  • M7 = List of appropriately configured mobile devices

  • M8 = Count of M7

  • M9 = List of inappropriately configured mobile devices

  • M10 = Count of M9

Metrics

Installed Software Coverage

Metric

What percentage of approved mobile devices are equipped with approved encryption
software?

Calculation

M4 / M2

Appropriately Configured Devices

Metric

What percentage of approved mobile devices equipped with approved encryption software
meet or exceed the approved configuration policy?

Calculation

M8 / M2