Device Lock | Pattern-Hiding Displays

Device Lock Pattern-Hiding Displays requires systems to replace sensitive screen content with a generic image when the device locks. This means your screensaver or lock screen must completely obscure any previously visible data—no blurred backgrounds showing document text or transparent overlays revealing confidential information.

Key takeaways:

  • Screensavers must use opaque images that fully conceal underlying content
  • Applies to all devices displaying FedRAMP-protected data, including workstations and mobile devices
  • Standard Windows/Mac transparency effects violate this requirement
  • Lock activation must be automatic within 15 minutes of inactivity
  • Screenshots and screen recordings require additional controls

Most organizations configure screensavers without realizing they're creating a compliance violation. AC-11(1) specifically prohibits the common practice of using blurred or semi-transparent lock screens that might reveal sensitive information to unauthorized viewers.

This NIST control enhancement addresses a real security gap: an attacker with physical proximity can extract meaningful information from poorly configured lock screens. Financial data, customer records, or system architectures visible through a translucent screensaver create unnecessary exposure.

The requirement applies to any system processing FedRAMP Moderate or High data, whether that's a developer workstation, administrator console, or mobile device accessing cloud services. Virtual desktop environments need special attention since their lock behavior often differs from physical machines.

Successful implementation requires coordinating with desktop engineering teams, updating group policy settings, and potentially replacing default operating system configurations. You'll also need to address edge cases like presentation mode, screen sharing applications, and multi-monitor setups where partial locking might occur.

Regulatory text

The control enhancement states: "Conceal, via the device lock, information previously visible on the display with a publicly viewable image" 1. This means when a device enters its locked state—whether manually triggered or through timeout—the screen must display an image that completely obscures any previously visible information. No sensitive data should be discernible through transparency, blur effects, or partial screen coverage.

Understanding the Technical Requirements

Pattern-hiding displays go beyond basic screensaver functionality. The control specifically requires a "publicly viewable image"—meaning the lock screen content itself contains no sensitive information. Common mistakes include:

Transparent overlays: Default Windows 10/11 lock screens show blurred versions of the desktop underneath. This violates AC-11(1) if documents or applications remain partially visible.

Notification previews: Lock screens that display email subjects, calendar appointments, or message previews expose sensitive information even when the device is locked.

Multi-monitor gaps: Systems that lock only the primary display while leaving secondary monitors active fail this requirement.

The "pattern-hiding" aspect refers to preventing information leakage through visual patterns. Even heavily blurred content can reveal document layouts, data visualizations, or application states that provide intelligence to an attacker.

Implementation Architecture

Successful deployment requires changes across multiple system layers:

Operating System Configuration

Configure native lock screen behavior through group policy (Windows) or configuration profiles (macOS/iOS). Key settings include:

  • Force opaque background images
  • Disable all notification previews
  • Remove recent application thumbnails
  • Block cortana/siri responses on lock screen

Application-Level Controls

Many applications bypass OS-level screen locking:

  • Presentation software often disables automatic locking
  • Video conferencing tools may keep screens active
  • Remote desktop clients can interfere with lock behavior

Create application-specific policies that enforce locking even during active sessions. Microsoft Teams, Zoom, and similar platforms need explicit configuration to respect system timeout settings.

Virtual Environment Considerations

VDI and remote desktop scenarios require special attention:

  • Configure both client and host-side locking
  • Ensure disconnect doesn't leave sessions visible
  • Address citrix/VMware published app behavior
  • Test lock propagation through connection brokers

Evidence Collection and Retention

Auditors consistently request these artifacts for AC-11(1) compliance:

Policy Documentation

  • Technical implementation guide showing exact GPO/profile settings
  • Screenshots of configured lock screen behavior
  • Exception approval forms for any deviations

Testing Evidence

  • Before/after screenshots demonstrating opacity
  • Multi-monitor lock verification
  • Notification preview test results
  • Lock timeout accuracy measurements

Monitoring Data

  • SIEM alerts for lock bypass attempts
  • Compliance scanning results showing policy application
  • Help desk tickets related to lock screen issues

Document your testing methodology thoroughly. Auditors want to see systematic verification across device types, not just spot checks on a single system.

Common Audit Findings and Remediation

FedRAMP assessors frequently cite these implementation gaps:

Finding: "Organization uses default Windows lock screen with transparency effects" Fix: Deploy solid color or static image via GPO. Set Computer Configuration > Administrative Templates > Control Panel > Personalization > "Force specific background image"

Finding: "Mobile devices display notification content when locked" Fix: Push MDM profile disabling lock screen notifications. For iOS: Set "Show Notifications on Lock Screen" to false. For Android: Configure "Hide sensitive content"

Finding: "Screen recording software captures content during lock transition" Fix: Implement 1-second display blanking before lock screen appears. Use PowerShell script triggered by lock event to force screen clear.

Finding: "Presentation mode disables automatic locking" Fix: Create separate "presentation" user accounts with modified timeout policies. Train users to switch accounts rather than disable locking.

Risk and Enforcement Context

While no public enforcement actions specifically cite AC-11(1) violations, lock screen failures often compound other findings. During the 2019-2021 FedRAMP assessment cycle, approximately 30% of Moderate baseline reviews included lock screen findings 2.

Non-compliance creates cascading risks:

  • Physical security controls become irrelevant if screens display data
  • Insider threat programs can't prevent "shoulder surfing" of locked devices
  • Incident response suffers when investigators can't secure evidence quickly

30/60/90-Day Implementation Plan

Immediate Actions (Days 1-30)

  • Inventory all device types accessing protected data
  • Document current lock screen configurations
  • Identify systems using transparent/blurred backgrounds
  • Create test group with 10-20 users across device types
  • Deploy opaque lock screens to test group
  • Gather feedback on usability issues

Near-term Improvements (Days 31-60)

  • Expand deployment to a meaningful percentage of users
  • Address application-specific conflicts discovered in testing
  • Create help desk runbooks for common issues
  • Implement monitoring for lock screen compliance
  • Document exceptions with risk acceptance forms
  • Schedule user awareness training

Ongoing Optimization (Days 61-90)

  • Complete organization-wide deployment
  • Automate compliance scanning via SCCM/similar
  • Integrate lock screen checks into device provisioning
  • Establish quarterly review of exception list
  • Create automated testing for new OS updates
  • Measure help desk ticket trends

Technical Implementation Details

Windows Group Policy Settings

User Configuration\Administrative Templates\Control Panel\Personalization
- Enable "Force a specific default lock screen image"
- Set path to approved image file
- Enable "Turn off fun facts on lock screen"
- Enable "Turn off Windows Spotlight"

Computer Configuration\Windows Settings\Security Settings\Local Policies
- Set "Interactive logon: Machine inactivity limit" to 900 seconds

macOS Configuration Profile

<dict>
    <key>loginWindowIdleTime</key>
    <integer>900</integer>
    <key>loginWindowModulePath</key>
    <string>/System/Library/Screen Savers/Computer Name.saver</string>
</dict>

Mobile Device Management

iOS Restriction Payload:

  • allowLockScreenNotificationsView: false
  • allowLockScreenControlCenter: false
  • allowLockScreenTodayView: false

Android Enterprise:

  • lockScreenShowNotifications: SHOW_NONE
  • keyguardDisabledFeatures: KEYGUARD_FEATURE_NOTIFICATIONS

Frequently Asked Questions

Can we use corporate branded images with our logo as lock screens?

Yes, as long as the image is completely opaque and contains no sensitive information. Logos and generic corporate imagery are acceptable.

Do privacy screens on monitors satisfy this requirement instead of configuring lock screens?

No. Privacy screens reduce viewing angles but don't conceal information from someone standing directly behind the user. Both controls work together but aren't substitutes.

What about systems that need to display status dashboards 24/7 without locking?

Create documented exceptions for specific systems with compensating controls like restricted physical access. Each exception needs risk acceptance from system owner and security team.

How do we handle executives who disable lock screens for convenience?

Executive devices often contain the most sensitive data. Provide alternatives like fingerprint readers or proximity cards that make unlocking faster while maintaining compliance.

Do virtual desktops need pattern-hiding displays if the thin client already locks?

Yes. Both endpoints must comply since either could expose data. Configure VDI sessions to lock independently of thin client behavior.

What's the difference between AC-11 base control and AC-11(1) enhancement?

AC-11 requires session lock capability. AC-11(1) specifically requires the locked screen to completely hide previous content with an opaque image.

Footnotes

  1. NIST SP 800-53 Rev 5

  2. FedRAMP PMO assessment metrics

Frequently Asked Questions

Can we use corporate branded images with our logo as lock screens?

Yes, as long as the image is completely opaque and contains no sensitive information. Logos and generic corporate imagery are acceptable.

Do privacy screens on monitors satisfy this requirement instead of configuring lock screens?

No. Privacy screens reduce viewing angles but don't conceal information from someone standing directly behind the user. Both controls work together but aren't substitutes.

What about systems that need to display status dashboards 24/7 without locking?

Create documented exceptions for specific systems with compensating controls like restricted physical access. Each exception needs risk acceptance from system owner and security team.

How do we handle executives who disable lock screens for convenience?

Executive devices often contain the most sensitive data. Provide alternatives like fingerprint readers or proximity cards that make unlocking faster while maintaining compliance.

Do virtual desktops need pattern-hiding displays if the thin client already locks?

Yes. Both endpoints must comply since either could expose data. Configure VDI sessions to lock independently of thin client behavior.

What's the difference between AC-11 base control and AC-11(1) enhancement?

AC-11 requires session lock capability. AC-11(1) specifically requires the locked screen to completely hide previous content with an opaque image.

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream