Network Trace
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

23) Does your organisation enforce full-disk encryption on all organisation-provisioned endpoint devices?

August 30, 2022
IT Operations
Laptops

Answer yes if your organisation allows the use of laptop devices for work purposes. In the notes, please describe whether these are typically company owned or personal devices.

Organisation-provisioned endpoint devices, such as laptops, mobile devices, and desktops, provide employees with flexibility while maintaining access to business data and services.

However, because these devices are often used outside an organisation’s physical premises, they face a higher risk of being lost, stolen, or compromised. Therefore, it is important that full-disk encryption is enabled on all organisation-provisioned endpoint devices to mitigate the risk of a data breach.

How to implement the control

Many endpoint devices now come with full-disk encryption as standard, but this should be confirmed before these devices are provisioned to staff.

Mobile devices

Current versions of iOS and Android provide built-in disk or file-level encryption, though implementations vary by platform.  Where possible, you should manage these devices using a Mobile Device Management (MDM) or Unified Endpoint Management (UEM) solution to enforce encryption policies and other security configurations, ensuring the encryption features are fully effective.

Windows Machines

If you manage your devices centrally (for example, by using an Active Directory), you can enforce device encryption through the use of Group Policies.If you do not manage your devices centrally, a local administrator should confirm and enable device encryption for each device before it is provisioned to staff. This should form part of your secure configuration checklist. For more information on how to enable encryption, see Microsoft's support article here.

macOS Machines

If you manage your devices centrally (for example, by using Microsoft's Endpoint Configuration Manager), you can enforce device encryption throughout the estate.If you do not manage your devices centrally, a local administrator should confirm and enable device encryption for each device before it is provisioned to staff. This should form part of your secure configuration checklist. For more information on how to enable encryption, see Apple's support article here.

If you would like to contribute to this article or provide feedback, please email knowledge@riskledger.com. Contributors will be recognised on our contributors page.

Pattern Trapezoid Mesh

Defend against supply chain attacks with Defend-As-One.

No organisation is an island.