Skip to main content

Field Security Hardening

This reference provides verification criteria for security configurations on field-deployed equipment. Use it during field site establishment, periodic security reviews, and pre-deployment preparation to confirm equipment meets minimum security requirements before deployment to field locations.

Prerequisites

Before using this checklist, confirm the following conditions:

RequirementDetail
Device inventoryComplete list of devices to be hardened with serial numbers and assigned users
MDM enrollmentDevices enrolled in mobile device management or alternative management confirmed
Baseline policiesOrganisation security policies reviewed and applicable requirements identified
Administrative accessCredentials and permissions to configure all device types
Verification toolsAccess to management consoles, command-line tools, and testing equipment

Device Hardening: Windows

Windows devices deployed to field locations require configurations that protect against physical theft, malware infection, and unauthorised access while maintaining usability on constrained networks.

ItemVerification methodPass criteriaEvidence
BitLocker full disk encryptionmanage-bde -status in elevated command promptProtection Status: On, Encryption Method: XTS-AES 256Screenshot of status output
BitLocker recovery key backupCheck Entra ID or on-premises AD for recovery keyRecovery key present and matches device IDRecovery key ID confirmation
Local administrator passwordAttempt login with default/common passwordsLogin fails; LAPS configured or unique password setLAPS policy confirmation
Firewall enablednetsh advfirewall show allprofilesState: ON for all profiles (Domain, Private, Public)Screenshot of firewall status
Automatic updatesSettings > Windows Update > Advanced optionsUpdates download automatically; restart within 7 daysScreenshot of update settings
Antimalware activeWindows Security > Virus & threat protectionReal-time protection: On, Definitions updated within 7 daysScreenshot of protection status
Screen lock timeoutSettings > Accounts > Sign-in optionsRequire sign-in: When PC wakes from sleep; Screen timeout: 5 minutes or lessScreenshot of lock settings
USB storage restrictionAttempt to mount USB storage deviceBlocked by policy or requires explicit authorisationPolicy configuration export
Remote Desktop disabledSettings > System > Remote DesktopRemote Desktop: Off (unless explicitly required)Screenshot of RDP settings
Guest account disablednet user guest in command promptAccount active: NoCommand output screenshot
Secure Boot enabledmsinfo32 > System SummarySecure Boot State: OnSystem information screenshot
TPM present and activetpm.msc or Device ManagerTPM ready for use, version 2.0TPM management console screenshot

Offline environments

Windows Update verification assumes network connectivity. For extended offline deployments, document the last update date and establish maximum offline period (60 days recommended) before mandatory reconnection for updates.

Device Hardening: macOS

macOS devices require FileVault encryption and system integrity protections that function independently of network connectivity.

ItemVerification methodPass criteriaEvidence
FileVault encryptionSystem Settings > Privacy & Security > FileVaultFileVault is turned onScreenshot of FileVault status
FileVault recovery keyCheck MDM or organisational key escrowRecovery key escrowed and retrievableKey escrow confirmation
Firewall enabledSystem Settings > Network > FirewallFirewall: OnScreenshot of firewall settings
Automatic updatesSystem Settings > General > Software UpdateAutomatic updates enabled, Install Security Responses: OnScreenshot of update settings
Screen lockSystem Settings > Lock ScreenRequire password: Immediately after sleep or screen saverScreenshot of lock settings
Gatekeeper enabledspctl --status in Terminalassessments enabledTerminal output screenshot
SIP enabledcsrutil status in TerminalSystem Integrity Protection status: enabledTerminal output screenshot
Remote Login disabledSystem Settings > General > SharingRemote Login: Off (unless explicitly required)Screenshot of sharing settings
Guest user disabledSystem Settings > Users & GroupsGuest User: OffScreenshot of user settings
Secure BootApple Silicon: always enabled; Intel: nvram 94b73556-2197-4702-82a8-3e1337dafbfb:AppleSecureBootPolicyFull Security or %02Boot security confirmation

Device Hardening: iOS and iPadOS

Mobile Apple devices require MDM enrollment for remote management capability and supervised mode for full security control in field environments.

ItemVerification methodPass criteriaEvidence
MDM enrollmentSettings > General > VPN & Device ManagementOrganisation MDM profile present and verifiedScreenshot of management profile
Supervised modeSettings > General > AboutDevice marked as supervised (for organisation-owned devices)Screenshot showing supervision
Passcode configuredAttempt device unlock6-digit numeric minimum; alphanumeric for sensitive data accessPolicy configuration
Passcode complexityMDM compliance checkMinimum 6 characters; no simple sequences (123456, 111111)MDM compliance report
Auto-lockSettings > Display & Brightness > Auto-Lock2 minutes or lessScreenshot of auto-lock setting
Data protectionSecurity Enclave presence confirmed via MDMHardware encryption enabled (all devices post-2013)MDM device inventory
USB Restricted ModeSettings > Face ID/Touch ID & PasscodeUSB Accessories: Off (require unlock for USB after 1 hour)Screenshot of USB setting
Find My enabledSettings > [Name] > Find MyFind My iPhone: On, Send Last Location: OnScreenshot of Find My settings
Automatic updatesSettings > General > Software Update > Automatic UpdatesAll automatic update options enabledScreenshot of update settings
App installationMDM policy checkApps install from App Store or MDM only; no sideloadingMDM policy configuration
iCloud backupFor sensitive deployments: Settings > [Name] > iCloud > iCloud BackupOff (use local encrypted backup or MDM backup)Screenshot of backup setting

Device Hardening: Android

Android device security depends heavily on manufacturer and version. These criteria apply to Android 12 and later on devices receiving security updates.

ItemVerification methodPass criteriaEvidence
MDM enrollmentSettings > Security > Device admin appsOrganisation MDM enrolled and activeScreenshot of device admin
EncryptionSettings > Security > EncryptionDevice encrypted (automatic on Android 10+)Screenshot of encryption status
Screen lockSettings > Security > Screen lockPIN (6+ digits), password, or biometric with PIN backupScreenshot of lock type
Lock timeoutSettings > Security > Screen lock > Advanced1 minute or lessScreenshot of timeout setting
Unknown sourcesSettings > Security > Install unknown appsAll apps set to “Not allowed”Screenshot of install permissions
Google Play ProtectGoogle Play Store > Profile > Play ProtectScan apps with Play Protect: OnScreenshot of Play Protect status
Security patch levelSettings > About phone > Android security patch levelWithin 90 days of current dateScreenshot showing patch date
Developer optionsSettings > System > Developer optionsDisabled or hiddenAttempt to access developer options
USB debuggingDeveloper options (if accessible)OffScreenshot if accessible
Find My DeviceSettings > Security > Find My DeviceOnScreenshot of Find My Device
Work profileFor BYOD: Settings > AccountsWork profile present and separate from personalScreenshot of profile separation

Android fragmentation

Security patch availability varies by manufacturer. Samsung devices typically receive monthly patches for 4 years; Google Pixel devices receive 5 years. Other manufacturers vary. Document device-specific support windows.

Network Configuration

Field network equipment requires hardening that accounts for physical access risks and untrusted network environments.

ItemVerification methodPass criteriaEvidence
Default credentials changedAttempt login with manufacturer defaultsDefault username/password rejectedSuccessful login with organisational credentials
Administrative interfaceCheck interface bindingAdmin interface bound to LAN only; WAN access disabledRouter configuration export
HTTPS for administrationBrowser connection to admin interfaceCertificate valid; HTTP redirects to HTTPS; no certificate warningsBrowser security indicator
Firmware versionCheck administration interfaceVersion current or within one release; no known critical vulnerabilitiesScreenshot of firmware version
WiFi encryptionWireless security settingsWPA3 or WPA2-AES; WPA/WEP disabledWireless configuration export
WiFi password strengthReview configured passwordMinimum 12 characters; not organisation name or locationPassword policy documentation
Guest network isolationNetwork configurationGuest network on separate VLAN; no access to internal resourcesNetwork topology documentation
UPnP disabledRouter security settingsUniversal Plug and Play: DisabledRouter configuration screenshot
Remote management disabledRouter WAN settingsRemote administration: DisabledRouter configuration screenshot
DNS configurationNetwork settings > DNSOrganisational DNS or trusted resolver (not ISP default)DNS configuration screenshot
Firewall rulesRouter firewall configurationInbound: deny all except required services; Outbound: allow establishedFirewall rule export
DHCP rangeDHCP settingsRange appropriate to expected devices; not excessiveDHCP configuration screenshot
Logging enabledRouter logging settingsSecurity events logged; log retention 30+ daysLogging configuration screenshot

Satellite and Connectivity Equipment

VSAT terminals and mobile connectivity equipment require specific hardening due to their role as network perimeter devices.

ItemVerification methodPass criteriaEvidence
Modem admin credentialsAttempt login with defaultsDefault credentials rejectedSuccessful login with unique credentials
Modem firmwareCheck modem administration interfaceCurrent version; no known vulnerabilitiesFirmware version screenshot
Modem interface accessCheck interface bindingAdministration accessible from LAN onlyConfiguration export
Encryption enabledSatellite provider configurationLink encryption active (provider-dependent)Provider configuration confirmation
Traffic monitoringReview modem statisticsBaseline traffic established; anomaly detection possibleBaseline documentation
Physical securityPhysical inspectionEquipment in locked enclosure; cables secured; tamper indicators presentPhotograph of installation
Backup connectivityTest failoverSecondary connection (cellular, alternate satellite) available and testedFailover test record
Data caps configuredProvider portal or modemUsage alerts at 75% and 90% of allocationAlert configuration screenshot

Authentication Requirements

Authentication configurations must balance security with field usability, particularly for shared devices and intermittent connectivity scenarios.

ItemVerification methodPass criteriaEvidence
MFA enabledIdentity provider configurationAll users require MFA for cloud servicesIdP policy configuration
MFA methodReview user MFA registrationsHardware key or authenticator app; SMS only as backupUser registration report
Offline authenticationTest authentication without connectivityCached credentials function for configured period (96 hours maximum)Test result documentation
Password policyIdentity provider password settingsMinimum 12 characters; complexity requirements enabledPassword policy configuration
Account lockoutIdentity provider security settingsLockout after 10 failed attempts; 30-minute lockout durationLockout policy configuration
Session timeoutApplication and IdP settingsIdle timeout: 8 hours maximum; absolute timeout: 12 hoursSession policy configuration
Service accountsReview service account inventoryDocumented purpose; password rotated within 90 days; no interactive loginService account register
Shared device modeFor shared tablets/kiosksSession data cleared on logout; automatic logout after 30 minutes idleShared device configuration
Local accountsDevice local account auditMinimum local accounts; documented purpose; unique passwordsLocal account inventory
Emergency accessBreak-glass account verificationEmergency accounts exist; credentials secured; access loggedEmergency account documentation

Encryption Requirements

Data at rest and in transit requires encryption appropriate to the classification of information processed in field locations.

ItemVerification methodPass criteriaEvidence
Disk encryptionSee device-specific sections aboveFull disk encryption enabled on all devicesDevice inventory with encryption status
Removable media encryptionAttempt to use unencrypted USBBlocked by policy or automatically encryptedPolicy verification
Database encryptionDatabase configuration reviewTransparent Data Encryption or equivalent enabledDatabase configuration
Backup encryptionBackup system configurationBackups encrypted at rest; encryption keys secured separatelyBackup configuration
Email encryptionMail client configurationTLS required for transmission; S/MIME or PGP available for sensitive contentMail configuration
VPN encryptionVPN configurationAES-256 or ChaCha20; no deprecated ciphers (DES, 3DES, RC4)VPN configuration export
TLS versionSSL Labs test or nmap --script ssl-enum-ciphersTLS 1.2 minimum; TLS 1.3 preferred; no SSL 3.0, TLS 1.0, TLS 1.1Test results
Certificate validityCertificate inspectionValid certificate; expiry more than 30 days; trusted CACertificate details
Key lengthCertificate and VPN configuration reviewRSA 2048-bit minimum; ECDSA P-256 minimumConfiguration documentation

Physical Security

Physical security controls compensate for the reduced environmental security of field locations compared to office environments.

ItemVerification methodPass criteriaEvidence
Cable locksPhysical inspectionLaptops secured with cable locks when unattended in officePhotograph of secured devices
Lockable storagePhysical inspectionSecure cabinet or safe available for devices overnightPhotograph of storage
Asset labelsPhysical inspectionAll devices labelled with asset tag and contact informationPhotograph of labelled device
Screen privacyPhysical inspection in working environmentPrivacy filters applied where shoulder-surfing risk existsPhotograph or inventory
Server/network cabinetPhysical inspectionNetwork equipment in locked cabinet; key control documentedPhotograph; key register
Visitor accessProcedure reviewVisitors escorted; no unaccompanied access to IT equipmentAccess procedure documentation
Device checkoutProcedure reviewPortable equipment signed out; return trackedCheckout register
Working away guidanceUser acknowledgmentStaff briefed on secure device handling during travelTraining record
Tamper evidencePhysical inspectionTamper-evident seals on critical equipment where appropriatePhotograph of seals
Disposal procedureProcedure reviewSecure disposal process documented; certificates retainedDisposal procedure; certificates

Data Handling

Field locations process sensitive data under conditions requiring specific handling controls to maintain confidentiality and comply with data protection requirements.

ItemVerification methodPass criteriaEvidence
Data classificationSpot check of stored filesFiles stored according to classification; no restricted data on unapproved devicesFile location audit
Local data minimisationDevice storage reviewOnly data required for current operations stored locallyStorage audit
Sync configurationApplication sync settingsSelective sync enabled; large archives excluded from field devicesSync configuration
Cloud storage accessAccess control reviewAccess limited to required folders; no organisation-wide access from fieldAccess control audit
Print controlsPrinter configurationSecure print enabled where available; print logs retainedPrinter configuration
Screen sharingApplication settingsScreen sharing requires authentication; disabled when not in useApplication configuration
Clipboard controlsMDM or endpoint policyClipboard blocked between managed and unmanaged applicationsPolicy configuration
Data retentionStorage auditTemporary files cleared; data deleted per retention scheduleRetention audit
Backup restorationTest restoreField backups restorable; tested within 90 daysRestore test record

Communication Security

Field communications traverse untrusted networks and may be subject to surveillance, requiring encryption and authentication for all organisational communications.

ItemVerification methodPass criteriaEvidence
VPN configurationVPN client settingsAlways-on VPN or VPN required before accessing organisational resourcesVPN policy configuration
VPN authenticationVPN configurationCertificate-based or MFA; no username/password onlyVPN authentication settings
Messaging encryptionApplication settingsEnd-to-end encryption enabled for sensitive communicationsApplication configuration
Voice encryptionTest call with encryption indicatorEncrypted calls possible; users trained on verificationTest call screenshot
Email securityMail headers inspectionSPF, DKIM, DMARC passing on sent mail; TLS on transmissionHeader analysis
Video conferencingPlatform settingsMeetings require authentication; waiting room enabled; recording controlsPlatform configuration
File transferTransfer method reviewSFTP, HTTPS, or encrypted platform; no unencrypted FTPTransfer audit
Public WiFiUser guidance and technical controlUsers avoid public WiFi or VPN enforced on untrusted networksPolicy acknowledgment; VPN config
BluetoothDevice settingsBluetooth off when not in use; no discoverable modeSpot check of devices

Exit Criteria

A device or field site passes security hardening verification when all applicable items in relevant sections meet pass criteria. Document exceptions using the exception handling process below.

Pass thresholds:

CategoryRequired pass rate
Device hardening (per platform)100% of applicable items
Network configuration100% of applicable items
Authentication100% of items
Encryption100% of items
Physical security90% of items; exceptions documented
Data handling100% of items
Communication security100% of items

Items marked as not applicable require documented justification explaining why the control does not apply to the specific deployment context.

Exception Handling

Security controls that cannot be implemented require formal exception approval before deployment.

Exception requirements:

ElementRequirement
Approval authorityIT security lead for 90-day exceptions; IT director for longer
DocumentationException form with control, reason, compensating controls, review date
Compensating controlsAlternative controls that mitigate the risk
Maximum duration180 days; then re-evaluate or implement permanent compensating control
ReviewExceptions reviewed quarterly

Exception register location: Document exceptions in the organisational risk register with link to detailed exception form.

Non-exceptionable items: The following items cannot be excepted under any circumstances:

  • Full disk encryption on devices storing personal data
  • MFA for cloud service access (offline caching is not an exception)
  • VPN encryption strength (AES-256 or equivalent)
  • Administrative credential changes from defaults

See also