Control connection of mobile devices
📖 What This Means
This control requires organizations to manage and restrict how mobile devices connect to their systems and networks. Mobile devices include smartphones, tablets, and laptops that can access organizational resources. The goal is to ensure that only authorized devices can connect, reducing the risk of unauthorized access or data breaches. For example, an employee’s personal smartphone should not be able to connect to the company’s Wi-Fi without proper security checks. Similarly, a contractor’s tablet should only access specific files if it meets the organization’s security standards. This control helps protect sensitive information from being accessed or stolen through insecure mobile connections.
🎯 Why It Matters
Uncontrolled mobile device connections can lead to significant security risks, such as unauthorized access to sensitive data, malware infections, and data breaches. For instance, in 2021, a major healthcare provider suffered a breach when an employee’s compromised smartphone accessed patient records, exposing thousands of sensitive records. The financial impact of such breaches can be substantial, often exceeding millions in fines, legal fees, and reputational damage. From a DoD/CMMC perspective, this control is critical because mobile devices are often used to access Controlled Unclassified Information (CUI). Ensuring secure connections minimizes the risk of CUI being compromised, aligning with DoD’s cybersecurity requirements.
✅ How to Implement
- Enable Mobile Device Management (MDM) solutions like Microsoft Intune or AWS WorkSpaces.
- Configure Conditional Access Policies in Azure AD to restrict device connections based on compliance status.
- Enforce Multi-Factor Authentication (MFA) for mobile device access to cloud resources.
- Implement Network Access Control (NAC) to allow only authorized devices to connect to cloud services.
- Regularly audit and update mobile device policies to ensure compliance.
📋 Evidence Examples
Mobile Device Management Policy
MDM Configuration Screenshots
Access Logs
Testing Results
Training Records
📝 SSP Guidance
Use this guidance when writing the System Security Plan (SSP) narrative for this control.
How to Write the SSP Narrative
For AC.L2-3.1.18 ("Control connection of mobile devices"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how access to CUI systems is controlled, including the specific IAM tools, policies, and processes used. Reference your Access Control Policy and identify the systems in scope. Be specific -- name your actual products, settings, and responsible personnel.
Example SSP Narratives
"AC.L2-3.1.18 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to control connection of mobile devices. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."
"AC.L2-3.1.18 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to control connection of mobile devices. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."
"AC.L2-3.1.18 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."
System Boundary Considerations
- • Identify all access points to CUI systems (VPN, direct network, cloud portals)
- • Document which IAM system manages access (Azure AD, AWS IAM, on-prem AD)
- • Map user roles to system access levels
- • Ensure this control covers all systems within your defined CUI boundary where control connection of mobile devices applies
- • Document any systems where this control is not applicable and explain why
Key Documentation to Reference in SSP
- 📄 Access Control Policy
- 📄 IAM configuration documentation
- 📄 Access request and approval records
- 📄 Evidence artifacts specific to AC.L2-3.1.18
- 📄 POA&M entry if control is not fully implemented
What the Assessor Looks For
The assessor will verify that access controls are implemented as described, test whether unauthorized users are blocked, and review access logs for evidence of enforcement.
💬 Self-Assessment Questions
Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.
Question 1: Do you have a Mobile Device Management (MDM) solution in place?
Question 2: Are mobile devices required to meet specific security standards before connecting?
Question 3: Are unauthorized mobile devices blocked from accessing the network?
Question 4: Are mobile device connections logged and monitored?
Question 5: Are employees trained on mobile device security policies?
⚠️ Common Mistakes (What Auditors Flag)
1. Not enforcing device compliance before allowing access.
2. Allowing personal devices unrestricted access.
3. Failing to monitor mobile device connections.
4. Not updating mobile device policies.
5. Incomplete documentation of mobile device controls.
📚 Parent Policy
This practice is governed by the Access Control Policy