3.1.18 — Mobile Device Control
What It Says
Section titled “What It Says”Control connection of mobile devices.
What It Actually Means
Section titled “What It Actually Means”Mobile devices — phones, tablets, e-readers, anything portable — that might access CUI must be:
- Registered — IT knows the device exists and who owns it
- Managed — MDM policies enforced (encryption, screen lock, remote wipe capability)
- Monitored — connections logged with device identity
Each device needs a unique identifier. Unregistered devices are blocked from accessing CUI resources. You decide whether to allow BYOD with MDM enrollment or restrict to company-owned devices only — but either way, every device is managed.
Pass or Fail
Section titled “Pass or Fail”Your assessor needs a “yes” to every row:
| # | Question | What “yes” looks like |
|---|---|---|
| 1 | Are mobile devices that handle CUI identified? | A maintained device inventory |
| 2 | Are mobile connections authorized? | Only approved devices connect |
| 3 | Are mobile connections monitored and logged? | Connection events recorded with device identity |
What to Have Ready on Assessment Day
Section titled “What to Have Ready on Assessment Day”Documents they’ll review: Access control policy, mobile device procedures, system design docs, configuration management plan, system security plan, system config, audit logs
People they’ll talk to: Mobile device users, sysadmins, information security staff
Live demos they’ll ask for: “Show me your MDM dashboard. Show me that an unregistered device is blocked.”
The Assessor’s Playbook
Section titled “The Assessor’s Playbook”These are the actual questions. Have answers ready.
- “Do you maintain a list of mobile devices permitted to handle CUI?”
- “Is the system configured to only permit authorized mobile devices?”
- “How do you handle BYOD?”
- “Show me your MDM policy enforcement.”
Where Companies Trip Up
Section titled “Where Companies Trip Up”No MDM. Mobile devices connect with no management or policy enforcement.
BYOD with no controls. Personal phones accessing CUI email without any device compliance requirements.
No device inventory. You don’t know which mobile devices have access to CUI.
How to Talk About This
Section titled “How to Talk About This”Connected Requirements
Section titled “Connected Requirements”| Requirement | Why it matters here |
|---|---|
| 3.1.16 — Wi-Fi Approval First | Wireless access that mobile devices use |
| 3.1.19 — Encrypt CUI on Mobile | Encrypting CUI on these devices |
Implementation
Section titled “Implementation”Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.
Start a conversation →CMMC Practice ID: AC.L2-3.1.18 | SPRS Weight: 5 points | POA&M Eligible: No