Cyber Essentials Self Assessment: Device Locking

This cyber essentials security wiki provides guidelines for implementing device locking mechanisms to enhance the security of your organisation's devices. Follow the recommendations below to protect against unauthorised access to software and services.

A5.9. Enabling Device Locking Mechanism:

Indicate whether you have enabled a locking mechanism on your devices to require user authentication before accessing the software and services installed. Answer "yes" or "no" to confirm the presence of this security measure.

A5.10. Method of Device Unlocking:

Specify the method used to unlock the devices and grant access to the software and services. Consider the Device Unlocking Credentials paragraph in the Cyber Essentials Requirements for IT Infrastructure document. Choose one of the following options or provide a description if none of the options apply:

  • Biometric authentication (e.g., fingerprint, facial recognition)
  • Password or PIN (minimum length specified in the document)
  • Other (please describe)

Implementing robust device locking mechanisms helps prevent unauthorised access and protects sensitive information stored on devices. It is essential to select secure unlocking methods that align with industry best practices to ensure the confidentiality and integrity of your organisation's data.

Note: The information provided above is based on general security practices. Organisations should adapt these guidelines to align with their specific requirements and consult with cybersecurity professionals for tailored advice related to device locking.

Find out more about Periculo Cyber Essentials or contact us