CIS Safeguard 4.10: Enforce Automatic Device Lockout on Portable Devices

CIS Safeguard 4.10: Enforce Automatic Device Lockout on Portable Devices

By Steve Gold
Posted in Security
On July 22, 2025

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation

In the TV series 24, Jack Bauer races against the clock to stop cyberattacks, terrorist threats, and national crises. Every second matters. A moment of inaction can lead to disaster.

That same urgency applies to CIS Safeguard 4.10, which emphasizes the importance of automatically locking portable end-user devices after a short period of inactivity. Because in cybersecurity, just like in 24, a few unattended minutes can be all an attacker needs.

What Is CIS Safeguard 4.10?

This safeguard is part of the Center for Internet Security (CIS) Critical Security Controls, specifically under Control 4: Secure Configuration of Enterprise Assets and Software.

Enforce automatic device lockout on portable end-user devices after a defined period of inactivity to prevent unauthorized access.”

Why It Matters

Portable devices—laptops, tablets, smartphones—are convenient, but they’re also high-risk. They’re easily lost, stolen, or left unattended in public places. Without automatic lockout, anyone who picks up an unlocked device can access sensitive data, emails, or even internal systems.

Real-World Risks:

  • Data breachesfrom lost or stolen devices
  • Unauthorized accessto corporate networks
  • Compliance violations(e.g., HIPAA, GDPR)

How to Implement Safeguard 4.10

Here’s how to channel your inner Jack Bauer and secure your devices before time runs out:

  1. Set Inactivity Timeouts
    Configure devices to lock automatically after 5–10 minutes of inactivity.
  2. Require Strong Authentication
    Use PINs, passwords, biometrics, or smart cards to unlock devices.
  3. Use Mobile Device Management (MDM)
    Enforce lockout policies across all portable devices using tools like Intune, Jamf, or Workspace ONE.
  4. Educate Users
    Train employees to manually lock devices when stepping away and to report lost/stolen devices immediately.
  5. Audit and Monitor
    Regularly review device compliance and lockout settings.

Final Thoughts: Don’t Let Time Run Out

In 24, Jack Bauer never left a threat unchecked. In your organization, automatic device lockout is your first line of defense against physical access threats. It’s simple, effective, and absolutely essential.

Because in cybersecurity, just like in 24every second counts.

"

Resources

Here’s a link to the Secure Configuration Management for CIS Control 4, 9, and 12 provided free of charge from the fine folks at the Center for Internet Security:

Looking for even more detail? Here you go. If this still doesn’t satisfy your curiosity, DM me.

CIS Control 4 – Secure Configuration of Enterprise Assets and Software

Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data.

CIS Safeguard 4.10: - Enforce Automatic Device Lockout on Portable End-User Devices

Enforce automatic device lockout following a predetermined threshold of local failed authentication attempts on portable end-user devices, where supported. For laptops, do not allow more than 20 failed authentication attempts; for tablets and smartphones, no more than 10 failed authentication attempts. Example implementations include Microsoft® InTune Device Lock and Apple® Configuration Profile maxFailedAttempts.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.