Device Lock
Device lock controls must automatically lock systems after a defined inactivity period and require full authentication to resume access. FedRAMP Moderate baseline requires organizations to define timeout values, implement screensaver locks, and maintain session termination capabilities across all system types.
Key takeaways:
- Define and enforce specific timeout periods for each system type
- Lock must require full re-authentication, not just a simple unlock
- Applies to all information systems: workstations, servers, mobile devices, and applications
- Document your timeout values and technical implementation in your System Security Plan
- Common audit failure: inconsistent implementation across different system types
Device lock requirements form a fundamental access control in the FedRAMP Moderate baseline, mandating automatic session termination after periods of inactivity. Under NIST SP 800-53 Rev 5 AC-11, organizations must implement technical controls that prevent unauthorized access to unattended systems by enforcing automatic locks and requiring proper authentication to regain access.
The control addresses a straightforward security gap: users who walk away from active sessions create opportunities for unauthorized access. While conceptually simple, proper implementation requires careful consideration of organizational needs, technical capabilities across diverse system types, and the balance between security and operational efficiency. Federal systems and cloud service providers pursuing FedRAMP authorization must demonstrate consistent device lock implementation across all information system components, from traditional workstations to containerized applications.
Regulatory text
The NIST SP 800-53 Rev 5 AC-11 control states: "Prevent further access to the system by initiating a device lock after an organization-defined time period of inactivity; and retain the device lock until the user reestablishes access using established identification and authentication procedures."
This requirement mandates two distinct technical capabilities:
- Automatic session locking triggered by inactivity timers
- Authentication-based unlocking that requires users to prove their identity before resuming work
The phrase "organization-defined time period" grants flexibility but also creates an obligation to document and justify your chosen timeout values. During FedRAMP assessments, auditors expect to see rational timeout periods based on system criticality and operational context.
Who This Applies To
Device lock requirements apply to:
- Cloud Service Providers (CSPs) seeking FedRAMP authorization at Moderate or High baselines
- Federal agencies implementing NIST controls for internal systems
- Contractors and third parties accessing federal information systems
- Any organization adopting NIST SP 800-53 as their security framework
The control covers all information system types:
- End-user workstations and laptops
- Administrative jump boxes and privileged access workstations
- Server console sessions (physical and virtual)
- Mobile devices processing federal data
- Web applications and SaaS platforms
- Remote access sessions (RDP, SSH, VPN clients)
Step-by-Step Implementation Guide
Phase 1: Define Timeout Values
Start by establishing timeout periods for each system category. Document these values in your System Security Plan (SSP) with justification for each choice.
Typical timeout values by system type:
- Standard workstations: 15 minutes
- Privileged administrative sessions: 5-10 minutes
- Public kiosks or shared terminals: 2-5 minutes
- Mobile devices: 5 minutes
- Server console sessions: 15-30 minutes
Phase 2: Configure Technical Controls
Windows Systems:
- Deploy Group Policy settings for screen saver timeouts
- Enable "On resume, display logon screen" option
- Set machine inactivity limits via Local Security Policy
- Configure PowerShell execution policies to prevent timeout bypasses
Linux/Unix Systems:
- Configure TMOUT variable in /etc/profile
- Set SSH ClientAliveInterval and ClientAliveCountMax
- Implement screen or tmux session timeouts
- Deploy PAM modules for session management
Web Applications:
- Implement session timeout in application code
- Configure load balancer idle timeouts
- Set cookie expiration aligned with timeout values
- Implement client-side warning messages before timeout
Mobile Devices:
- Deploy MDM policies for screen lock timeouts
- Require PIN/biometric for unlock
- Configure app-specific timeouts for federal data access
- Enable remote wipe capabilities
Phase 3: Handle Special Cases
Several scenarios require additional consideration:
Long-Running Processes: Systems executing batch jobs or lengthy computations need exemption procedures. Document these exceptions with:
- Business justification for extended sessions
- Compensating controls (isolated networks, enhanced monitoring)
- Approval workflow for timeout extensions
- Regular review of exempted systems
Shared Workstations: Devices used by multiple operators need aggressive timeout values and clear session handoff procedures. Implement:
- Shortened timeouts (2-5 minutes)
- Forced logoff between users
- Session activity logging
- User training on proper logout procedures
Remote Access: VPN and remote desktop sessions require aligned timeout values across multiple control points:
- VPN client idle timeout
- Remote desktop session timeout
- Application-layer timeout
- Token/certificate validity periods
Required Evidence and Artifacts
Maintain these artifacts for audit readiness:
-
Configuration Standards: Document showing timeout values for each system type with business justification
-
Technical Implementation Evidence:
- Group Policy reports showing enforced settings
- Configuration files from Linux/Unix systems
- Application code snippets implementing session timeout
- MDM policy screenshots for mobile devices
-
Testing Results: Reports demonstrating timeout enforcement:
- Screen captures showing lock screens after inactivity
- Log entries showing session termination events
- Penetration test results validating re-authentication requirements
-
Exception Documentation:
- List of systems with extended/disabled timeouts
- Business justification for each exception
- Compensating control descriptions
- Management approval records
-
User Awareness Materials: Training content explaining device lock requirements and procedures
Common Audit Questions and Responses
Auditors consistently focus on these areas:
"How did you determine your timeout values?" Provide your documented risk assessment showing how timeout values balance security requirements with operational needs. Reference specific mission functions that informed your decisions.
"Show me timeout enforcement on [random system]" Demonstrate the control live or provide recent screenshots. Have remote access ready to multiple system types. Know how to quickly display Group Policy results or check Linux environment variables.
"What happens if someone bypasses the screensaver?" Show your controls preventing timeout bypass: disabled registry editing, blocked screensaver configuration changes, application whitelisting preventing unauthorized tools.
"How do you handle service accounts?" Document your approach to non-interactive accounts. Show how service accounts either cannot establish interactive sessions or operate under compensating controls.
Implementation Mistakes to Avoid
Inconsistent Timeout Values: The most common failure involves different timeout settings across similar systems. A Windows workstation with 15-minute timeout while another uses 30 minutes raises immediate red flags. Maintain standardization within system categories.
Weak Re-authentication: Some organizations implement "unlock" features that don't require full authentication. Smart card removal should lock the system, but unlocking must require both the card AND PIN. Password-protected screensavers must enforce the same complexity rules as initial login.
Missing System Types: Organizations often overlook:
- Administrator jump boxes
- Database client sessions
- Development environments
- Virtual desktop infrastructure (VDI) sessions
- Containerized application consoles
Inadequate Exception Handling: Undocumented exceptions sink otherwise solid implementations. Every system requiring extended timeouts needs formal documentation, not just technical configuration.
30/60/90-Day Execution Plan
Immediate Actions (Days 1-30):
- Inventory all information system types requiring device lock controls
- Document current timeout configurations across the environment
- Identify systems lacking timeout enforcement
- Draft organization-defined timeout values for SSP inclusion
Near-term Implementation (Days 31-60):
- Deploy Group Policy changes for Windows environments
- Configure Linux/Unix system timeouts via configuration management
- Update application session timeout values
- Begin user communication about upcoming timeout changes
Ongoing Maturation (Days 61-90):
- Conduct timeout testing across all system types
- Document exceptions with proper approvals
- Generate compliance reports from technical controls
- Schedule quarterly reviews of timeout values and exceptions
Frequently Asked Questions
Do virtual machines require separate device lock controls if the host system locks?
Yes, each virtual machine requires independent timeout configuration. Host system locks don't propagate to guest VMs, and users might access VMs through other methods bypassing host controls.
How should we handle kiosk systems that need to stay active for public use?
Kiosk systems require session termination between users rather than traditional screen locks. Implement application-level timeouts that return to a "home" state and clear any user data after inactivity.
Can we use different timeout values for different user roles?
Yes, role-based timeout values are acceptable if documented and technically enforced. Privileged users often require shorter timeouts than standard users. Document the risk-based rationale in your SSP.
What if our legacy application doesn't support session timeouts?
Document the limitation as a risk in your POA&M. Implement compensating controls such as network isolation, enhanced logging, and regular session audits. Plan for application updates or replacement.
Do mobile devices require lock screens if they use app-specific authentication?
Yes, device-level locks are required regardless of app-level controls. FedRAMP expects defense-in-depth with both device locks (PIN/biometric) and app-specific authentication for federal data access.
How do we prove timeout enforcement during remote audits?
Prepare video demonstrations showing timeout behavior, collect timestamped screenshots of lock screens, and gather system logs showing session termination events. Have remote access ready for live demonstrations.
Frequently Asked Questions
Do virtual machines require separate device lock controls if the host system locks?
Yes, each virtual machine requires independent timeout configuration. Host system locks don't propagate to guest VMs, and users might access VMs through other methods bypassing host controls.
How should we handle kiosk systems that need to stay active for public use?
Kiosk systems require session termination between users rather than traditional screen locks. Implement application-level timeouts that return to a "home" state and clear any user data after inactivity.
Can we use different timeout values for different user roles?
Yes, role-based timeout values are acceptable if documented and technically enforced. Privileged users often require shorter timeouts than standard users. Document the risk-based rationale in your SSP.
What if our legacy application doesn't support session timeouts?
Document the limitation as a risk in your POA&M. Implement compensating controls such as network isolation, enhanced logging, and regular session audits. Plan for application updates or replacement.
Do mobile devices require lock screens if they use app-specific authentication?
Yes, device-level locks are required regardless of app-level controls. FedRAMP expects defense-in-depth with both device locks (PIN/biometric) and app-specific authentication for federal data access.
How do we prove timeout enforcement during remote audits?
Prepare video demonstrations showing timeout behavior, collect timestamped screenshots of lock screens, and gather system logs showing session termination events. Have remote access ready for live demonstrations.
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream