Encrypt Data on End>User Devices
Description
Encrypt data on end-user devices containing sensitive data. Example implementations can include: Windows BitLocker®, Apple FileVault®, Linux® dm-crypt.
Implementation Checklist
Tool Recommendations
Data governance and compliance platform with DLP, information protection, sensitivity labels, and insider risk management
Microsoft · Per-user subscription (E5/standalone)
Cloud-native DLP and CASB platform providing inline data protection for SaaS, IaaS, web, and endpoint
Netskope · Per-user subscription
Data-centric security platform with DLP across endpoint, network, cloud, and email with risk-adaptive protection
Forcepoint · Per-user subscription
Threats & Vulnerabilities (CIS RAM)
Threat Scenarios
Data Theft from Lost or Stolen Laptop
ConfidentialityAn unencrypted laptop is stolen or lost during travel, exposing all stored sensitive data including credentials, client records, and intellectual property to the thief.
Forensic Data Extraction from Seized Devices
ConfidentialityAdversaries with physical access to unencrypted end-user devices extract sensitive data by booting from external media or removing storage drives for offline analysis.
Insider Data Theft via Physical Access
ConfidentialityA departing or malicious employee accesses unencrypted data on their device offline, bypassing network-based access controls and DLP tools.
Vulnerabilities (When Safeguard Absent)
Unencrypted End-User Device Storage
Without full-disk encryption on laptops, desktops, and mobile devices, physical access to the device grants unrestricted access to all stored data.
No Enforcement of Encryption on BYOD Devices
Personal devices accessing enterprise data lack mandatory encryption policies, leaving sensitive data unprotected if the device is lost, stolen, or compromised.
Evidence Requirements
| Type | Evidence Item | Collection Frequency |
|---|---|---|
| Technical | Configuration screenshots or exports showing protection controls enabled | Captured quarterly |
| Document | Procedure documentation for protection measures | Reviewed annually |
| Technical | Encryption configuration evidence (disk encryption status, TLS settings) | Scanned monthly |
| Document | Key management procedures and key rotation records | Reviewed annually |
| Document | Governing policy document (current, approved, communicated) | Reviewed annually |