🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Mobile Device Connection Policy for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.18 (With Template)

Practical guide and ready-to-use template for creating a mobile device connection policy to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AC.L2-3.1.18).

•
March 28, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to design and implement a Mobile Device Connection Policy that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AC.L2-3.1.18, provides technical configuration guidance, and includes a ready-to-use policy template you can adapt for a small business handling Controlled Unclassified Information (CUI).

Scope, mapped requirements, and key objectives

The policy you build should define what mobile devices may connect to organizational systems, how they authenticate and are authorized, what controls (encryption, endpoint protection, configuration management) are mandatory, and how access is monitored and revoked. For AC.L2-3.1.18 the objective is explicit: ensure mobile devices connecting to organizational assets do so in a controlled, auditable, and secure manner so that CUI and network integrity are preserved. The scope should list device types (smartphones, tablets, laptops), ownership models (BYOD, COPE, corporate-owned), supported OS versions, and network contexts (corporate Wi‑Fi, VPN, cellular, guest networks).

Practical implementation steps (actionable)

Start with inventory and classification: identify all mobile endpoints, map which access each needs, and classify what CUI they may handle. Choose an enterprise mobility management (EMM/MDM) platform (Microsoft Intune, VMware Workspace ONE, Jamf, or MobileIron) and require enrollment before granting access to corporate resources. Implement device posture checks — require device encryption, screen lock, up-to-date OS (e.g., minimum Android 11 / iOS 15 as baseline, adjusted to business needs), no root/jailbreak, and mandatory device certificates. Enforce conditional access rules so only compliant devices can reach CUI systems.

Technical controls and configuration details

Enforce certificate-based authentication and 802.1X for Wi‑Fi (EAP-TLS with RADIUS backend). Use TLS 1.2 or higher (TLS 1.3 preferred) for all app and web traffic to corporate services. Mandate full-disk or file-level encryption (AES-256 where possible) and strong device passcodes (minimum 6 digits + biometrics where supported). Deploy per-app VPN or app containerization (MAM) to keep corporate traffic inside managed tunnels and prevent data leakage to personal apps. Configure NAC (Network Access Control) to segment devices: corporate devices on VLAN A, BYOD with limited access on VLAN B, guest on VLAN C; use NAC to enforce posture checks prior to network access. Require MFA for all user authentication to resources; for device-to-resource authentication, prefer certificate + device compliance as a conditional access factor.

Small-business example / scenario

Example: a 30-person defense subcontractor needs CUI access for 8 field engineers. Practical approach: enroll corporate phones and laptops in Microsoft Intune, set conditional access via Azure AD to require device compliance and MFA, use Microsoft Defender for Endpoint for threat detection, restrict CUI repositories to IPSec/vpn and Intune-managed apps with DLP policies. For Wi‑Fi, use an entry-level managed switch/Wi‑Fi controller that supports 802.1X and configure FreeRADIUS or cloud RADIUS for EAP-TLS. For a small IT team, the pragmatic choice is cloud MDM + conditional access + per-app VPN to reduce on-prem complexity while meeting AC.L2-3.1.18.

Compliance tips, exceptions, and best practices

Document all exceptions with formal approval, risk justification, and time limits. Keep an up-to-date inventory tied to asset tags and MDM identifiers; automate reporting for noncompliant devices and configure alerts for critical events (failed posture checks, revoked certificates, remote wipe actions). Schedule quarterly attestation reviews and annual policy review. Train users on acceptable use, how to enroll devices, and how to report lost/stolen devices. For small businesses, leverage managed services for SIEM/logging to centralize audit logs from MDM, RADIUS, VPN, and NAC so you can demonstrate monitoring during an assessment.

Risk of non‑implementation

Failing to implement a controlled mobile connection policy increases risk of data exfiltration, lateral movement from a compromised device into back-end systems, exposure of CUI, and regulatory or contractual breaches that can result in lost contracts, fines, and reputational damage. Real-world incident: an un-enrolled employee’s rooted phone with access to email was phished, credentials reused on a corporate VPN, enabling access to shared drives containing CUI. A simple policy requiring MDM enrollment and conditional access could have prevented that access.

Policy template (copy, customize, and adopt)

Organization: 
Policy Title: Mobile Device Connection Policy
Control Reference: NIST SP 800-171 Rev.2 / CMMC 2.0 AC.L2-3.1.18
Effective Date:     Review Date: 

1. Purpose
   - Define requirements for mobile devices connecting to organizational systems that access, process, or store CUI.

2. Scope
   - Applies to all mobile devices (smartphones, tablets, laptops) accessing corporate resources from any network (corporate Wi‑Fi, VPN, public/cellular).
   - Covers BYOD and corporate-owned devices.

3. Definitions
   - Device Enrollment: Registration in the organization's MDM/EMM.
   - Compliance Profile: MDM policy including encryption, screen lock, OS version, anti‑malware.

4. Policy Statements
   - Enrollment: All devices must be enrolled in  prior to access to corporate resources.
   - Authentication: Devices must use certificate-based device authentication (EAP-TLS for Wi‑Fi) and users must use MFA for resource access.
   - Device Health/Posture: Devices must meet these minimums:
       • OS: Android >= 11, iOS >= 15, Windows 10/11 latest build
       • Encryption: Full disk / file encryption (AES-256)
       • Screen lock: Timeout <= 5 minutes; biometric or passcode (min 6 characters)
       • No root/jailbreak; device integrity checked via MDM
       • Up-to-date patching: Critical security updates applied within 14 days, other security updates within 30 days
   - Network Access:
       • Corporate Wi‑Fi uses 802.1X (EAP-TLS) and devices must present valid device certs.
       • Per-app VPN required for CUI access; split tunneling disabled for managed apps.
       • NAC enforces VLAN segmentation and posture check before granting access.
   - Data Protection: Managed apps must enforce DLP; copying CUI to unmanaged apps is prohibited.
   - Remote Actions: IT may perform remote wipe or selective wipe for lost/stolen/noncompliant devices.
   - Logging & Monitoring: Enrollment, authentication, posture failures, and remote actions will be logged and forwarded to SIEM for 365-day retention (or per contractual requirement).
   - Exceptions: Documented and approved by Security Officer; time-limited and periodically reviewed.

5. Roles & Responsibilities
   - Device Owner/User: Comply with policy, enroll device, report loss/theft.
   - IT/InfoSec: Configure MDM, NAC, RADIUS, monitor logs, perform incident response.
   - Managers: Approve exceptions and ensure users comply.

6. Enforcement
   - Noncompliant devices will be quarantined, blocked, or wiped depending on severity.
   - Policy violations may result in disciplinary action.

7. Review & Audit
   - Policy reviewed annually or after major changes to the environment or regulation.

In summary, to meet AC.L2-3.1.18 you need a documented policy, enforced technical controls (MDM, certificate-based auth, NAC, encryption, conditional access), logging and review processes, and clear roles for enforcement and exception handling. For small businesses, use cloud-managed MDM and conditional access to reduce operational burden while achieving the required protections for CUI.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes