Safeguard 3.6: Encrypt Data on End-User Devices
Safeguard 3.6: encrypt data on end-user devices requirement means you must ensure laptops, desktops, and mobile devices encrypt data at rest so loss, theft, or unauthorized access does not expose sensitive information. Operationalize it by enforcing full-disk encryption through central device management, proving coverage with reports, and remediating exceptions with documented risk acceptance. 1
Key takeaways:
- Enforce full-disk (and where needed file-level) encryption on all end-user devices that store or access sensitive data. 2
- Centralize control: manage encryption settings, keys, and compliance reporting through endpoint management. 3
- Audit-readiness depends on evidence: device inventories, encryption compliance reports, exception handling, and periodic verification. 2
End-user devices are where sensitive data most often “escapes” governance: cached email, offline files, synced folders, browser artifacts, exported reports, and locally stored credentials. Safeguard 3.6 focuses your program on a simple outcome: if a device is lost, stolen, or accessed by someone who should not have it, the data on that device remains unreadable without authorized credentials and keys. 2
For a Compliance Officer, CCO, or GRC lead, the challenge is rarely choosing an encryption technology. The hard parts are scoping (which devices count), making encryption mandatory without breaking operations, handling exceptions (legacy devices, BYOD, specialized endpoints), and retaining evidence that an auditor can rely on. This requirement page gives you requirement-level implementation guidance you can put into a control narrative, ticket into IT, and test in a repeatable way. 1
If you already have endpoint management, you can usually implement this with configuration enforcement and reporting. If you do not, your priority becomes basic endpoint governance first: inventory, ownership, and centralized policy enforcement so encryption is measurable and not “best effort.” 2
Regulatory text
Framework: CIS Controls v8
Safeguard: 3.6
Provided excerpt: “CIS Controls v8 safeguard 3.6 implementation expectation (Encrypt Data on End-User Devices).” 1
Operator meaning: You are expected to implement encryption on end-user devices so data stored locally is protected. The control is only “done” if encryption is enforced, monitored, and provable through recurring evidence, not if it is merely “available” or “recommended.” 2
Plain-English interpretation (what auditors expect you to mean)
Encrypting data on end-user devices means:
- Data at rest on laptops/desktops is encrypted using full-disk encryption (typical default), so removing a drive or booting from external media does not expose readable files.
- Mobile devices are encrypted (native device encryption) and are managed so encryption status is enforced and reportable.
- Encryption is not optional for in-scope devices, except where you have documented, time-bound exceptions with compensating controls.
- You can prove coverage across the fleet with system-generated reports and a clear mapping from inventory → policy → compliance status. 1
This safeguard is primarily about confidentiality impact from device loss/theft and unauthorized local access. It also reduces downstream breach response scope when you can show stolen devices were encrypted and keys were protected.
Who it applies to (entity and operational context)
Applies to:
- Enterprises and technology organizations implementing CIS Controls v8. 1
Operational scope (what “end-user devices” typically includes):
- Corporate-managed laptops and desktops (Windows, macOS, Linux).
- Corporate-managed mobile devices (iOS, Android).
- Contractor devices and BYOD if they are allowed to access or store your data locally (even temporarily), or if they have access to systems that sync data locally. Your policy can reduce scope by restricting local storage through virtual desktops or browser-only access, but then you must enforce those restrictions.
Common “in scope” data types (decide and state yours):
- Customer data, regulated data, credentials/keys, internal financials, source code, incident data, and any files classified above a defined threshold in your data classification scheme.
What you actually need to do (step-by-step)
1) Define scope and success criteria
- Define end-user device categories (laptops/desktops, mobile, special-purpose endpoints).
- Define what “encrypted” means for each category (full-disk encryption for laptops/desktops; native device encryption for mobile; file-level encryption for high-risk folders if required by your internal policy).
- Define the minimum control state you will accept:
- Encryption enabled
- Pre-boot/OS authentication required (where applicable)
- Recovery keys escrowed and access-controlled
- Continuous compliance reporting available
Deliverable: a one-page control standard that your endpoint team can implement and your auditors can test.
2) Centralize enforcement through endpoint management
- Select your control plane (examples: MDM/UEM for mobile and macOS; endpoint management for Windows; configuration management for Linux).
- Create encryption configuration profiles for each platform:
- Windows: enforce BitLocker (or equivalent) and require TPM-based protection where feasible; escrow recovery keys to a controlled directory.
- macOS: enforce FileVault and escrow recovery keys in your MDM.
- iOS/Android: require device encryption, prohibit devices that cannot encrypt, and enforce screen lock requirements that protect encryption keys.
- Block access for noncompliant devices where possible (conditional access / device compliance gates).
Control objective: the default path for any newly enrolled device results in encryption being turned on automatically.
3) Make keys recoverable but controlled
- Escrow recovery keys in a system admins can access under a documented process.
- Restrict key access to a limited admin group with role-based access control.
- Log key retrieval (who, when, why) and review periodically.
Audit reality: many programs “have encryption” but cannot prove keys are protected and access is governed.
4) Handle exceptions with discipline
Create an exception workflow that includes:
- Device identifier, owner, business justification
- Why encryption cannot be enabled
- Compensating controls (restricted access, VDI-only, no local storage, enhanced monitoring)
- Expiration date and re-review trigger
- Risk acceptance by the right approver (often Security + business owner)
Keep exceptions rare and time-bound. “Legacy device” without a retirement plan becomes an audit finding.
5) Monitor and prove compliance continuously
- Produce a recurring encryption compliance report from your management tooling showing:
- Total enrolled devices
- Encryption enabled/disabled status
- Devices not reporting (a common blind spot)
- Triaging process for noncompliance:
- Fix configuration drift
- Re-enroll devices
- Replace unsupported hardware
- Validate effectiveness by sampling devices and confirming encryption status locally (screenshots/commands) and in the central console.
6) Document the control operation (so it survives staff turnover)
Write a short control narrative:
- Purpose and risk addressed
- In-scope devices and data
- How encryption is enforced per platform
- How keys are escrowed and accessed
- How compliance is monitored and how exceptions are handled
- Evidence collected and review cadence
CIS-aligned practical note: map Safeguard 3.6 explicitly to “documented control operation and recurring evidence capture” so your assessment doesn’t devolve into screenshots hunting. 1
Required evidence and artifacts to retain
Keep evidence that answers: “Which devices are in scope, are they encrypted, and can you prove it over time?”
Core artifacts
- Policy/standard: endpoint encryption standard covering platforms and scope.
- System configuration evidence: MDM/UEM/endpoint management profiles enforcing encryption (exported settings or screenshots).
- Inventory + compliance report: device list with encryption status and last check-in (export or scheduled report).
- Key management evidence: proof of escrow configuration, access control settings for recovery keys, and key retrieval logs.
- Exception register: approved exceptions with compensating controls and expirations.
- Periodic review evidence: tickets or meeting notes showing noncompliance remediation and exception re-approval.
Testing artifacts (for auditors)
- Sample device verification: command output or system UI showing encryption enabled for a selection of endpoints, tied back to the inventory record.
Common exam/audit questions and hangups
- “Show me your population.” If you cannot produce an authoritative endpoint inventory, encryption coverage claims will be discounted.
- “How do you know encryption stays enabled?” Auditors want monitoring and drift detection, not one-time enablement.
- “Where are recovery keys stored, and who can access them?” Weak key governance undermines the control.
- “What about BYOD/contractors?” Expect scrutiny if they access email, file shares, or SaaS that syncs locally.
- “What happens when a device stops checking in?” Non-reporting devices are frequently the real control gap.
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails in audits | Fix |
|---|---|---|
| Relying on user-enabled encryption | Inconsistent, hard to prove, easy to bypass | Enforce via MDM/UEM with compliance gating |
| No escrowed recovery keys | You’ll choose between data loss and insecure workarounds | Escrow keys in a controlled directory/MDM and restrict access |
| Treating “encrypted” as a checkbox | Devices can drift, fail encryption, or stop reporting | Continuous compliance reporting + remediation workflow |
| Ignoring non-reporting devices | Blind spot hides high-risk endpoints | Alerts for stale check-ins, re-enrollment, or offboarding |
| Permanent exceptions | Converts a technical limitation into an accepted exposure | Time-box exceptions and tie them to a remediation plan |
Enforcement context and risk implications
No public enforcement cases were provided in the supplied source catalog for this safeguard. The practical risk is still straightforward: lost or stolen endpoints are common breach entry points, and an organization that cannot prove device encryption often must treat device loss as a potential data exposure event, increasing incident scope and notification decision pressure. 2
A practical 30/60/90-day execution plan
First 30 days (stabilize scope and visibility)
- Establish the written endpoint encryption standard for each platform and define in-scope device categories. 2
- Confirm the authoritative endpoint inventory source and identify unmanaged endpoints.
- Export a baseline encryption status report (even if incomplete) and open remediation tickets for the highest-risk gaps (executive devices, admins, engineering, finance).
Days 31–60 (enforce and gate)
- Deploy enforced encryption profiles for Windows/macOS and require encryption compliance for mobile via MDM/UEM. 3
- Implement key escrow and restrict key access; enable audit logging for key retrieval.
- Stand up the exception workflow and register; move all “known problem devices” into tracked exceptions or remediation.
Days 61–90 (operationalize and make it audit-proof)
- Automate scheduled compliance reporting and route failures to a ticketing queue.
- Add conditional access (where feasible) so noncompliant devices lose access to sensitive systems.
- Run an internal mini-audit: sample endpoints, reconcile inventory vs. compliance reports, and validate evidence packaging.
- In Daydream, map Safeguard 3.6 to your control narrative and set recurring evidence collection so each cycle produces consistent artifacts without manual scramble. 1
Frequently Asked Questions
Does Safeguard 3.6 require full-disk encryption, or is file/folder encryption enough?
The safeguard expectation is encryption on end-user devices; full-disk encryption is the common way to meet that outcome for laptops/desktops. If you use file-level encryption, document why it provides equivalent protection for the data types and threat scenarios in your environment. 2
Are mobile phones in scope?
If mobile devices access or store your organization’s data, treat them as end-user devices and enforce native encryption through MDM/UEM compliance policies. Document any devices or platforms you prohibit because they cannot meet your encryption baseline. 1
What about BYOD or contractor laptops?
If they can download, sync, or cache your data locally, they are a risk driver. Either require enrollment into a management program that can attest encryption status, or restrict access to prevent local data storage and document that design. 2
How do we prove encryption is enabled for an audit?
Provide an inventory-backed compliance report from your endpoint management tooling plus a small sample of device-level verification outputs tied to asset IDs. Keep the encryption enforcement policy and key escrow configuration as supporting evidence. 2
If a device is encrypted, do we still need remote wipe?
Encryption reduces data exposure risk from physical loss, while remote wipe addresses scenarios where a device remains reachable and you want to reduce residual risk. Treat wipe as a complementary control; Safeguard 3.6 is specifically about encryption at rest. 2
What’s the cleanest way to manage and audit recovery key access?
Store keys in a controlled system (directory service/MDM), restrict access to a small admin group, and retain logs of each retrieval with a ticket reference. Review key access logs as part of your normal security oversight. 2
Footnotes
Frequently Asked Questions
Does Safeguard 3.6 require full-disk encryption, or is file/folder encryption enough?
The safeguard expectation is encryption on end-user devices; full-disk encryption is the common way to meet that outcome for laptops/desktops. If you use file-level encryption, document why it provides equivalent protection for the data types and threat scenarios in your environment. (Source: CIS Controls v8)
Are mobile phones in scope?
If mobile devices access or store your organization’s data, treat them as end-user devices and enforce native encryption through MDM/UEM compliance policies. Document any devices or platforms you prohibit because they cannot meet your encryption baseline. (Source: CIS Controls v8; CIS Controls Navigator v8)
What about BYOD or contractor laptops?
If they can download, sync, or cache your data locally, they are a risk driver. Either require enrollment into a management program that can attest encryption status, or restrict access to prevent local data storage and document that design. (Source: CIS Controls v8)
How do we prove encryption is enabled for an audit?
Provide an inventory-backed compliance report from your endpoint management tooling plus a small sample of device-level verification outputs tied to asset IDs. Keep the encryption enforcement policy and key escrow configuration as supporting evidence. (Source: CIS Controls v8)
If a device is encrypted, do we still need remote wipe?
Encryption reduces data exposure risk from physical loss, while remote wipe addresses scenarios where a device remains reachable and you want to reduce residual risk. Treat wipe as a complementary control; Safeguard 3.6 is specifically about encryption at rest. (Source: CIS Controls v8)
What’s the cleanest way to manage and audit recovery key access?
Store keys in a controlled system (directory service/MDM), restrict access to a small admin group, and retain logs of each retrieval with a ticket reference. Review key access logs as part of your normal security oversight. (Source: CIS Controls v8)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream