Skip to content
CSF Tools Logo

CSF Tools

  • Home
  • Visualizations
  • References
  • Blog
  • CSA Cloud Controls Matrix
  • Cloud Controls Matrix v3.0.1
  • MOS: Mobile Security

MOS-10: Device Management

Control Family:

Mobile Security

CSF v1.1 References:

  • PR.AC-3
  • PR.PT-2

PF v1.0 References:

  • PR.AC-P3
  • PR.PT-P1

Control Statement

A centralized, mobile device management solution shall be deployed to all mobile devices permitted to store, transmit, or process customer data.

  • Home
  • Disclaimer
  • Privacy Policy
  • Contact Us

Share

  • Facebook
  • Twitter
  • LinkedIn
  • Reddit
  • Mail
Security Visualizations

Frameworks and Controls

  • NIST Cybersecurity Framework
    • Cybersecurity Framework v1.1 [Summary]
  • NIST Privacy Framework
    • Privacy Framework v1.0 [Summary]
  • NIST Special Publication 800-53
    • NIST SP 800-53, Revision 4 [Summary]
    • NIST SP 800-53, Revision 5 [Summary]
  • NIST Special Publication 800-171
    • NIST SP 800-171 Revision 2 [Summary]
  • CSA Cloud Controls Matrix
    • Cloud Controls Matrix v3.0.1 [Summary]
      • AIS: Application & Interface Security
      • AAC: Audit Assurance & Compliance
      • BCR: Business Continuity Management & Operational Resilience
      • CCC: Change Control & Configuration Management
      • DSI: Data Security & Information Lifecycle Management
      • DCS: Datacenter Security
      • EKM: Encryption & Key Management
      • GRM: Governance and Risk Management
      • HRS: Human Resources
      • IAM: Identity & Access Management
      • IVS: Infrastructure & Virtualization Security
      • IPY: Interoperability & Portability
      • MOS: Mobile Security
        • MOS-01: Anti-Malware
        • MOS-02: Application Stores
        • MOS-03: Approved Applications
        • MOS-04: Approved Software for BYOD
        • MOS-05: Awareness and Training
        • MOS-06: Cloud Based Services
        • MOS-07: Compatibility
        • MOS-08: Device Eligibility
        • MOS-09: Device Inventory
        • MOS-10: Device Management
        • MOS-11: Encryption
        • MOS-12: Jailbreaking and Rooting
        • MOS-13: Legal
        • MOS-14: Lockout Screen
        • MOS-15: Operating Systems
        • MOS-16: Passwords
        • MOS-17: Policy
        • MOS-18: Remote Wipe
        • MOS-19: Security Patches
        • MOS-20: Users
      • SEF: Security Incident Management, E-Discovery, & Cloud Forensics
      • STA: Supply Chain Management, Transparency, and Accountability
      • TVM: Threat and Vulnerability Management
  • CIS Critical Security Controls
    • Critical Security Controls v7.1 [Summary]
    • Critical Security Controls v8 [Summary]
  • STRIDE-LM Threat Model
  • Home
  • Visualizations
  • References
  • Blog
CSF Tools Privacy Policy Proudly powered by WordPress