1. Purpose of This Guide
Mobile devices (phones, tablets) often access company email, files, apps, and sensitive data. If they’re lost, stolen, or compromised, attackers shouldn’t be able to stroll right in.
This artefact demonstrates that your organisation configures mobile devices securely, specifically showing that:
-
Devices are not jailbroken or rooted
-
Passcodes / biometric locks are enabled
-
Automatic screen lock activates after 2 minutes of inactivity
-
Apps are installed only from official app stores (no sideloading)
This helps auditors confirm your mobile fleet isn’t the soft underbelly of your defences.
2. What You Will Submit
Upload one or more screenshots showing:
-
Device Settings → Passcode / Screen Lock is enabled
-
Auto-lock or screen timeout = 2 minutes (or less)
-
Device status page confirming it is not rooted/jailbroken
-
App Store / Google Play as the only allowed source for apps
(e.g., “Unknown Sources: Off”)
Each screenshot should be from a representative corporate device (company-owned or BYOD enrolled in your policy).
3. How to Collect / Obtain / Generate This Evidence
Below are the simplest ways to capture the required screenshots on iOS and Android.
A. Apple iOS / iPadOS Devices
1. Passcode Enabled
Go to:
Settings → Face ID & Passcode
Screenshot the top of the screen showing:
- “Turn Passcode Off” (this proves a passcode is currently enabled)
2. Auto-Lock = 2 Minutes
Go to:
Settings → Display & Brightness → Auto-Lock
Screenshot showing “2 Minutes” or any shorter value (1 min).
3. Device Not Jailbroken
iPhones do not display a “jailbroken” status, so auditors will accept:
-
A screenshot of Settings → General → About showing normal OS version and no jailbreak indicators.
-
Optional: Screenshot of Settings → General → VPN & Device Management showing standard profiles (if any).
4. Official App Store Use
iOS does not permit sideloading unless jailbroken.
A screenshot of Settings → Screen Time → Content & Privacy Restrictions → iTunes & App Store Purchasesproving apps are only installed from the App Store is sufficient.
B. Android Devices (Samsung, Google Pixel, Oppo, Xiaomi, etc.)
1. Screen Lock / Passcode Enabled
Go to:
Settings → Security → Screen Lock
Screenshot showing:
- “PIN enabled”, “Pattern enabled”, or “Fingerprint + PIN”
2. Auto-Lock = 2 Minutes
Go to:
Settings → Display → Screen timeout
Screenshot showing 2 minutes.
3. Device Not Rooted
Go to:
Settings → About Phone → Status / Device Status
Screenshot showing:
-
“Official” or “Certified”
-
OR the Google Play Protect certification page:
Settings → Google → Device certification
Many devices show: “Device status: Official” → this is accepted evidence.
4. No Sideloading of Apps
Go to:
Settings → Security → Install unknown apps
Ensure the toggle for sideloading is OFF for all apps.
Screenshot the page showing:
-
“Allowed from this source: Off”
or -
A global policy preventing unknown sources.
C. If You Use MDM (Mobile Device Management)
(Microsoft Intune, Google Endpoint Management, MobileIron, Jamf, etc.)
You may provide:
-
Screenshot of the device compliance report
-
Screenshot of the MDM policy showing screen lock + timeout rules
-
Screenshot showing the device is compliant
This method is highly recommended for organisations with >5 mobile users.
4. Evidence Format
Accepted File Types:
-
PNG
-
JPG
-
PDF
Suggested Naming Convention:
YourCompanyName_MobileSecureConfig_YYYY-MM-DD
Example:
AcmeClinic_MobileSecureConfig_2025-03-15.png
5. What “Good” Looks Like
A strong submission contains:
-
At least 2-3 screenshots covering:
-
Passcode enabled
-
Auto-lock timer
-
Not rooted/jailbroken
-
Official app installation only
-
-
Clear time and device context
The screenshot should show the settings menu and labels. -
Representative device
You do not need screenshots for every staff device — just one example device used in the organisation. -
Optional (but excellent):
Evidence from your MDM showing compliance.
This proves that mobile devices in your environment cannot be easily exploited or misused.
6. Tips
-
Redact personal details if needed (phone number, Apple ID, Google account).
-
If your business does not use mobile devices for work, you may mark this clause as Not Applicable.
-
If BYOD is allowed, ensure staff configure their devices securely before connecting to company systems.