UEM-08: Is information protected from unauthorized disclosure on managed endpoints
with storage encryption?
To minimize data leak risks and protect data stored on the endpoint device, use encryption. Encryption capabilities could be part of common endpoint solutions such as DLP, endpoint firewalls, and PAM. Additionally, they could be standalone (e.g., device container technology, file encryption, and full-disk encryption). The encryption strength should be based on the sensitivity of the data being protected.
Endpoint device policies should use encryption for the entire device or data identified as sensitive on all mobile devices (potentially using container technology). This policy should be enforced through technology controls.
Control implemented
Control ownership
Description
Protect information from unauthorized disclosure on managed endpoint
devices with storage encryption.