4.10
IG2 IG3

Enforce Automatic Device Lockout on Portable End>User Devices

Asset Type: Devices
Security Function: Respond

Description

Enforce automatic device lockout following a predetermined threshold of local failed authentication attempts on portable end-user devices, where supported. For laptops, do not allow more than 20 failed authentication attempts; for tablets and smartphones, no more than 10 failed authentication attempts. Example implementations include Microsoft® InTune Device Lock and Apple® Configuration Profile maxFailedAttempts.

Implementation Checklist

1
Define response procedures and playbooks
2
Assign response roles and responsibilities
3
Establish response timeframes and SLAs
4
Test response procedures through tabletop or simulation
5
Document lessons learned and update procedures
6
Identify systems requiring multi-factor authentication
7
Select and deploy MFA solution
8
Enroll users and distribute authentication factors
9
Test MFA across all identified systems
10
Select hardening benchmark (CIS Benchmarks, DISA STIGs)
11
Create baseline configuration templates
12
Deploy configurations using automation tools
13
Schedule compliance scanning to detect drift

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Brute-Force Password Attack on Lost Device

Confidentiality

An attacker with physical possession of a lost or stolen portable device attempts unlimited password guesses to unlock the device and access all stored data and credentials.

Automated PIN Cracking on Mobile Devices

Confidentiality

Specialized tools perform rapid automated PIN or passcode brute-force attempts against mobile devices without lockout protections, cracking short PINs in minutes.

Vulnerabilities (When Safeguard Absent)

No Failed Authentication Lockout on Portable Devices

Without automatic lockout after failed authentication attempts, attackers can perform unlimited brute-force password guessing against portable devices.

Inconsistent Lockout Thresholds Across Device Types

Without enforced lockout policies for laptops and mobile devices, some devices allow unlimited authentication attempts while others may have inadequate thresholds.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Response procedure/playbook documentation Reviewed bi-annually
Record Response action logs showing procedure execution Per incident
Technical Configuration compliance scan results against approved baseline Scanned monthly
Document Approved baseline configuration documentation Reviewed quarterly
Document Governing policy document (current, approved, communicated) Reviewed annually