3.6
IG1 IG2 IG3

Encrypt Data on End>User Devices

Control Group: 3. Data Protection
Asset Type: Devices
Security Function: Protect

Description

Encrypt data on end-user devices containing sensitive data. Example implementations can include: Windows BitLocker®, Apple FileVault®, Linux® dm-crypt.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Identify all data requiring encryption
7
Select approved encryption algorithms and key lengths (AES-256)
8
Deploy encryption solution and verify data protection
9
Establish key management procedures

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Data Theft from Lost or Stolen Laptop

Confidentiality

An unencrypted laptop is stolen or lost during travel, exposing all stored sensitive data including credentials, client records, and intellectual property to the thief.

Forensic Data Extraction from Seized Devices

Confidentiality

Adversaries with physical access to unencrypted end-user devices extract sensitive data by booting from external media or removing storage drives for offline analysis.

Insider Data Theft via Physical Access

Confidentiality

A departing or malicious employee accesses unencrypted data on their device offline, bypassing network-based access controls and DLP tools.

Vulnerabilities (When Safeguard Absent)

Unencrypted End-User Device Storage

Without full-disk encryption on laptops, desktops, and mobile devices, physical access to the device grants unrestricted access to all stored data.

No Enforcement of Encryption on BYOD Devices

Personal devices accessing enterprise data lack mandatory encryption policies, leaving sensitive data unprotected if the device is lost, stolen, or compromised.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Technical Encryption configuration evidence (disk encryption status, TLS settings) Scanned monthly
Document Key management procedures and key rotation records Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually