CIS Controls v8.1 Mobile Companion Guide
Published on March 2, 2026
The security challenges associated with using mobile devices in the enterprise warrants special consideration. While many of the core security concerns of enterprise IT systems are shared by mobile devices and their management systems, unique challenges exist.
This document uses a consistent approach to analyze CIS Critical Security Controls® (CIS Controls®) v8.1 and Safeguards in the context of mobile security.
For each of the CIS Controls, the following information is provided:
- Applicability: Applicability assesses the degree to which a CIS Control functions within the mobile technology environment.
- Deployment Considerations: Deployment considerations analyze if anything unique should be done for a particular mobile deployment model, such as Bring Your Own Device (BYOD) or the fully-managed model.
- Additional Discussion: This is a general area for any guidance that also needs to be noted. For instance, relevant tools, products, or threat information that could be of use can be noted here.
As of June 23, 2025, the MS-ISAC has introduced a fee-based membership. Any potential reference to no-cost MS-ISAC services no longer applies.