4.3
IG1 IG2 IG3

Configure Automatic Session Locking on Enterprise Assets

Asset Type: Users
Security Function: Protect

Description

Configure automatic session locking on enterprise assets after a defined period of inactivity. For general purpose operating systems, the period must not exceed 15 minutes. For mobile end-user devices, the period must not exceed 2 minutes.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Unauthorized Physical Access to Unlocked Workstation

Confidentiality

An attacker or malicious insider accesses sensitive data, installs malware, or executes commands on an unattended workstation that never locked due to missing auto-lock configuration.

Shoulder Surfing and Session Hijacking

Confidentiality

In shared office spaces or public locations, unlocked idle sessions expose sensitive data on screen and allow passersby to interact with authenticated application sessions.

Vulnerabilities (When Safeguard Absent)

No Automatic Session Locking on Idle Devices

Without configured automatic session locking, unattended devices remain logged in indefinitely, granting physical access equal to authenticated user access.

Inconsistent Lock Timeout Across Device Types

Without standardized lock policies, some devices lock after minutes while others never lock, creating inconsistent protection that users cannot rely on.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually