Final answer:
Enforce device encryption, activate MAM, and configure and monitor devices with an MDM to protect data and meet the given requirements.
Step-by-step explanation:
The technical controls that would best protect the data from attack or loss and meet the given requirements are:
- Enforce device encryption: By enabling full-device encryption, the organization ensures that the data stored on the devices is protected even if the device is lost or stolen.
- Activate MAM (Mobile Application Management): This allows the organization to containerize the email, calendar, and contacts, ensuring that these sensitive data are isolated from the rest of the device and can be remotely wiped if necessary.
- Configure and monitor devices with an MDM (Mobile Device Management): MDM enables the organization to enforce security policies, such as blocking unsigned applications, and remotely manage and monitor the devices accessing corporate data.
By implementing these technical controls, the organization can ensure that sensitive data is protected and the requirements of active full-device encryption, enabled remote-device wipe, blocking unsigned applications, and containerization of email, calendar, and contacts are met.