Vigyata.AI
Is this your channel?

Episode 16_ACCESS CONTROL FOR MOBILE DEVICES_ (AC-19)

706 views· 34 likes· 11:38· May 17, 2023

🛍️ Products Mentioned (4)

In this episode of the NIST SP 800-53 Rev 5 Security Control explanatory series, We reviewed the AC-19 ACCESS CONTROL FOR MOBILE DEVICES and then tried to simplify what the control requirements are all about, and how best to assess/test this control during the Security Control Assessment (SCA) process and self control assessment process in the Continuous Monitoring/On-Going Authorization phase of the RMF. Computer Security Resource Center https://csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true​ ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** CashApp: $Kamilzak Zelle: kaamilzak@gmail.com paypal: https://paypal.me/MZakari Venmo: @kamilsec Thank You!!! ************************************************************* **I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION AS WELL AS ON THE JOB CONSULTATION** *************************************************************** ****Connect with me on Social Media***: Twitter: https://twitter.com/Kamilzak_1​ Instagram: @Kamilzak1 Facebook: https://www.facebook.com/kamil.kamilsec E-Mail: Kaamilzak@gmail.com

About This Video

In Episode 16 of my NIST SP 800-53 Rev 5 Access Control series, I break down AC-19 (Access Control for Mobile Devices) and simplify what the control is really asking you to do. I walk through what “mobile devices” means in the NIST discussion (smartphones, tablets, small form factor devices with storage and power), and I explain the practical access control mechanisms organizations typically use—PIN/passwords and patterns, biometrics like fingerprint/face recognition, device encryption, and remote wipe capabilities to protect data when devices are lost or stolen. Then I get into the actual AC-19 requirement: establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices—especially when they’re outside the organizational perimeter—and authorize how those devices connect to organizational systems. I also call out an important reality: AC-19 is often not applicable for many systems unless your system actually relies on mobile device connectivity. Finally, I cover how I assess/test AC-19 during an SCA or continuous monitoring. My approach starts with examining the SSP plus access control policies/procedures to understand the organization’s specific restrictions and connection requirements. From there, I validate the implementation by testing a real connection (or reviewing configuration evidence like screenshots) to confirm the restrictions are actually effective.

Frequently Asked Questions

🎬 More from KamilSec