NIST 800-171 - Access Control for Mobile Devices (3.1.18)
Overview:
Control connection of mobile devices.
Action Items:
3.1.18[a]
Determine if: mobile devices that process, store, or transmit CUI are identified.
3.1.18[b]
Determine if: mobile device connections are authorized.
3.1.18[c]
Determine if: mobile device connections are monitored and logged.
POTENTIAL ASSESSMENT METHODS AND OBJECTS
1
Examine: Access control policy; authorizations for mobile device connections to organizational systems; procedures addressing access control for mobile device usage (including restrictions); system design documentation; configuration management plan; system security plan; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records].
2
Interview: Personnel using mobile devices to access organizational systems; system or network administrators; personnel with information security responsibilities].
3
Test: Access control capability authorizing mobile device connections to organizational systems].
Related Documents (document name and content will vary by organization):
1) Access control policy
2) authorizations for mobile device connections to organizational systems
3) procedures addressing access control for mobile device usage (including restrictions)
4) system design documentation
5) configuration management plan
6) system security plan
7) system audit logs and records
8) system configuration settings and associated documentation
9) other relevant documents or records
Additional Guidance:
A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); possesses local, non-removable or removable data storage; and includes a self-contained power source. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, or built-in features for synchronizing local data with remote locations. Examples of mobile devices include smart phones, e-readers, and tablets.
Due to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different types of devices. Usage restrictions and implementation guidance for mobile devices include, for example: configuration management; device identification and authentication; implementation of mandatory protective software (e.g., malicious code detection, firewall); scanning devices for malicious code; updating virus protection software; scanning for critical software updates and patches; conducting primary operating system (and possibly other resident software) integrity checks; and disabling unnecessary hardware (e.g., wireless, infrared). The need to provide adequate security for mobile devices goes beyond this requirement. Many safeguards for mobile devices are reflected in other CUI security requirements. NIST Special Publication 800-124 provides guidance on mobile device security.