Show: AC.L2-3.1.18 – Control connection of mobile devices.
This control comes from NIST SP 800-171 REV.2 / CMMC 2.0 Level 2.
This control requires you to identify which mobile devices (smartphones and tablets) process, store, or transmit Controlled Unclassified Information (CUI); to authorize those devices before they connect; and to monitor and log their connections. The goal is to keep unmanaged or non-compliant devices from accessing CUI and to maintain visibility over all approved devices to reduce risk.
Establish a mobile device policy that defines which devices may access CUI, the security requirements they must meet, and who can approve access. Include onboarding/offboarding steps, a BYOD (bring-your-own-device) stance, device authorization workflow, periodic access reviews, monitoring and logging requirements, and a lost/stolen device response (including remote wipe). Document exceptions and approvals, define roles for security and system administrators, and require users to acknowledge responsibilities.
A 120-person engineering firm decides that only enrolled and compliant devices can access corporate email that may contain CUI. The IT manager documents a BYOD policy and chooses Microsoft 365 with Intune to manage smartphones. They configure Conditional Access so users must enroll in Intune before the Outlook mobile app can sign in. Compliance policies require device encryption, a six-digit PIN, auto-lock after 5 minutes, a minimum OS version, and block rooted or jailbroken devices. A project manager installs Outlook on her personal phone; when she signs in, she is prompted to enroll the device and accept the policy. After enrollment, the device enforces a stronger PIN and confirms encryption is on, and Outlook then connects. The MDM logs show the device moved to “Compliant” and the access grant is recorded. Later, when the phone’s OS falls behind, Conditional Access blocks email until the manager updates, keeping noncompliant devices away from CUI.
AC.L2-3.1.18 is met when you clearly identify which mobile devices handle CUI, authorize them through a defined workflow, enforce security controls with MDM and Conditional Access, and continuously monitor and log their connections. A practical policy combined with enforceable technical controls—encryption, PINs, OS/version checks, jailbreak/root detection, app protection, and remote wipe—prevents unmanaged devices from accessing CUI and provides the visibility and audit trail SMBs need to control risk.
Quick & Simple
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you
We typically reply within minutes