Agency|Insights
Trust BuildingCompliance Operations

BYOD Security for ISO 27001: Policy and Control Requirements

How to address BYOD within ISO 27001, covering relevant Annex A controls, policy requirements, acceptable use agreements, MDM implementation, data separation, and evidence for auditors.

Agency Team
Agency Team
·13 min read
Typographic card for BYOD Security for ISO 27001: Policy and Control Requirements in Compliance Operations

One of the most common questions we get at Agency from companies pursuing ISO 27001 is how to handle bring-your-own-device environments without creating a compliance nightmare. The short answer we give: ISO 27001 does not prohibit BYOD, but it does require you to manage the risks that personal devices introduce to your information security management system. In our experience, the companies that get this right treat BYOD not as a policy afterthought but as a defined scope within their ISMS, with specific controls, documented risk treatment, and auditable evidence. The companies that struggle are the ones that let personal devices proliferate without formal governance and then scramble to retrofit controls before their certification audit.

This guide covers how to address BYOD within ISO 27001, including the relevant Annex A controls, policy requirements, acceptable use agreements, MDM implementation, data separation techniques, remote wipe capabilities, evidence collection for auditors, and the practical challenge of balancing employee privacy with information security.

Relevant Annex A Controls for BYOD

ISO 27001:2022 includes several Annex A controls that directly apply to BYOD environments. What we tell clients is that BYOD is not addressed by a single control — it spans multiple control domains, and your implementation needs to address each one.

A.8.1 — User Endpoint Devices

This is the primary control for BYOD. A.8.1 requires that information stored on, processed by, or accessible via user endpoint devices is protected. For BYOD, this means:

RequirementBYOD Implementation
Device registrationAll personal devices accessing company data must be registered and inventoried
Security configurationMinimum security baselines must be enforced (screen lock, encryption, OS version)
Data protectionCompany data on personal devices must be protected from unauthorized access
Incident proceduresProcedures must exist for lost, stolen, or compromised personal devices

A.7.9 — Security of Assets Off-Premises

Personal devices regularly leave the office environment, making A.7.9 directly relevant. This control requires that security measures are applied to off-site assets, taking into account the different risks of working outside the organization's premises. What we recommend is treating every BYOD device as permanently off-premises, because that is the reality of how they are used.

A.5.10 — Acceptable Use of Information and Other Associated Assets

BYOD requires a clear acceptable use policy that covers how personal devices may access, store, and transmit company information. In our experience, this is the control where most organizations start their BYOD governance because it sets the boundaries for everything else.

Additional Relevant Controls

ControlRelevance to BYOD
A.8.5 — Secure authenticationAuthentication requirements for BYOD access to company systems
A.8.24 — Use of cryptographyEncryption requirements for data stored on personal devices
A.8.10 — Information deletionProcedures for removing company data from personal devices when access is no longer required
A.5.11 — Return of assetsProcess for recovering or deleting company data when an employee leaves or changes role
A.6.2 — Terms and conditions of employmentBYOD responsibilities included in employment agreements

BYOD Policy Requirements

Building an ISO 27001-Compliant BYOD Policy

What we tell clients is that a BYOD policy for ISO 27001 must do three things: define who can use personal devices and for what purposes, specify the security controls that are required on those devices, and establish what happens when things go wrong. Here is the structure we recommend.

Scope and eligibility. Define which roles are eligible for BYOD, which device types are permitted (smartphones, tablets, laptops), and which operating systems and minimum versions are supported. In our experience, limiting supported platforms reduces complexity significantly. We typically see clients permit iOS 16+ and Android 13+ for mobile devices and macOS 13+ and Windows 11 for laptops.

Security requirements. Specify the minimum security configuration for enrolled devices.

Security RequirementMinimum Standard
Screen lockRequired, maximum 5-minute timeout
Device encryptionFull disk encryption required (FileVault, BitLocker, device-native encryption)
Operating systemCurrent major version minus one (e.g., iOS 17 or iOS 16)
Passcode complexityMinimum 6-digit PIN or biometric authentication
Jailbreak/root detectionJailbroken or rooted devices prohibited
Antivirus/endpoint protectionRequired for Windows and macOS devices
Automatic updatesMust be enabled for OS and security patches

Data handling rules. Define what data can and cannot be stored locally on personal devices, how data must be transmitted, and what happens to data when the device is decommissioned.

Compliance monitoring. Describe how the organization will verify ongoing compliance with BYOD security requirements. This is where MDM becomes essential.

Acceptable Use Agreements

In our experience, the acceptable use agreement is the document that auditors ask for most frequently when reviewing BYOD implementations. It must be signed by every employee using a personal device for work purposes, and it should clearly state:

  • The employee consents to security monitoring of the work profile or managed container on their device
  • The organization may remotely wipe company data (not personal data) from the device
  • The employee is responsible for maintaining the device within minimum security requirements
  • The employee must report lost or stolen devices immediately
  • Company data must not be transferred to unmanaged applications or personal cloud storage
  • The organization is not responsible for personal data on the device

What we recommend is making the acceptable use agreement a condition of BYOD enrollment — no signed agreement, no access.

MDM Implementation for ISO 27001

Why MDM Is Effectively Required

While ISO 27001 does not mandate MDM by name, what we tell clients is that satisfying A.8.1 without MDM is impractical for any organization with more than a handful of BYOD users. MDM provides the enforcement mechanism that turns your BYOD policy from a document into a verifiable control. Without MDM, you are relying on employees to self-enforce security requirements, which auditors will not accept as a reliable control.

MDM Deployment for BYOD

MDM CapabilityISO 27001 Control AddressedHow It Works
Device enrollment and inventoryA.8.1 — User endpoint devicesPersonal devices are registered and tracked in the MDM inventory
Compliance checkingA.8.1 — User endpoint devicesMDM continuously verifies devices meet security baselines (encryption, OS version, passcode)
ContainerizationA.8.1, A.8.24 — CryptographyWork data is isolated in an encrypted container separate from personal data
Remote selective wipeA.8.10 — Information deletionCompany data can be removed from the device without affecting personal data
Certificate managementA.8.5 — Secure authenticationDevice certificates enable secure, verifiable access to company resources
Application managementA.5.10 — Acceptable useControl which applications can access company data within the work container

Data Separation and Containerization

Data separation is one of the most critical aspects of BYOD for ISO 27001, and it is also where the privacy balance becomes most important. What we recommend is a containerized approach where company data lives in a managed work profile or container that is logically separated from personal data.

How containerization works in practice:

  • On Android, this is typically implemented through the Android Enterprise work profile, which creates a separate encrypted container for work applications and data
  • On iOS, MDM profiles create a managed partition where work applications and accounts operate under organizational control
  • On macOS and Windows laptops, containerization is more challenging — common approaches include virtual desktop infrastructure (VDI), managed browser environments, or application-level DLP controls

In our experience, mobile containerization is mature and well-supported by major MDM vendors. Laptop containerization is less standardized, which is why we often recommend clients consider whether BYOD laptops are worth the additional complexity versus providing company-owned laptops.

Remote Wipe Capabilities

ISO 27001 requires procedures for handling lost, stolen, or compromised devices. For BYOD, remote wipe must be selective — removing only company data and leaving personal data intact.

Wipe TypeWhen to UseISO 27001 Justification
Selective wipeEmployee leaves the organization, device is lost, policy violation detectedA.8.10, A.5.11 — Remove company data when access is no longer authorized
Full wipeNot recommended for BYODFull device wipe of a personal device creates legal and employee relations risks
Application wipeSpecific application data needs to be removedA.8.10 — Remove data from specific managed applications

What we tell clients is to never configure full device wipe capability on personal devices. Selective wipe should be the maximum action, and this must be clearly communicated in the acceptable use agreement. Employee trust in the BYOD program depends on the organization demonstrating that personal data will not be affected.

Evidence for Auditors

What ISO 27001 Auditors Expect

In our experience, auditors evaluating BYOD implementations look for a complete chain from policy to enforcement to evidence. Here is what you need to have ready.

Evidence CategorySpecific EvidenceSource
Policy documentationBYOD policy, acceptable use agreement template, data classification policyPolicy management system or document repository
Signed agreementsSigned acceptable use agreements for all BYOD usersHR system or document management
Device inventoryCurrent list of all enrolled personal devices with compliance statusMDM console export
Compliance reportsReports showing device compliance rates against security baselinesMDM reporting dashboard
Incident recordsRecords of BYOD-related security incidents and response actionsISMS incident management system
Risk assessmentBYOD-specific risk assessment within the ISMS risk registerRisk management tool or register
Access control evidenceEvidence that BYOD access is restricted based on device complianceMDM conditional access logs, identity provider logs

Common Audit Findings

What we see most frequently in ISO 27001 audits related to BYOD:

FindingRoot CauseHow to Prevent
Missing acceptable use agreementsEmployees using personal devices without signed agreementsMake agreement signing part of MDM enrollment; block access without signed agreement
Devices not meeting security baselinesMDM compliance policies not enforced or too lenientConfigure MDM to block access for non-compliant devices; do not just report
No process for employee departureCompany data not wiped from personal devices when employees leaveIntegrate selective wipe into offboarding checklist; automate through HR-MDM integration
Incomplete device inventoryPersonal devices accessing company data outside MDMEnforce MDM enrollment as a condition of access through conditional access policies
Risk assessment gapsBYOD risks not formally assessed in the ISMS risk registerInclude BYOD as a named risk scenario in your risk assessment methodology

Balancing Employee Privacy with Security

The Privacy Challenge

What we tell clients is that BYOD privacy is not just a policy question — it is a trust question. If employees believe the organization can see their personal photos, messages, or browsing history, adoption of the BYOD program will fail regardless of the technical controls. This matters for ISO 27001 because a BYOD policy that employees circumvent is worse than no BYOD policy at all.

Privacy Boundaries We Recommend

Organization Can SeeOrganization Cannot See
Work application data and usagePersonal application data or usage
Device compliance status (encryption, OS version, passcode set)Personal photos, messages, browsing history
Work email and calendarPersonal email and calendar
Device location (only if explicitly disclosed and consented)Personal contacts
Managed application inventoryPersonal application inventory outside work profile

Making Privacy Tangible

In our experience, the most effective approach is to publish a clear privacy disclosure alongside the acceptable use agreement. This disclosure should state in plain language what the organization can and cannot see on a personal device. We recommend including specific examples such as: "We can see that your device is encrypted. We cannot see your personal photos." This transparency builds trust and increases BYOD enrollment rates.

Implementing BYOD Controls Step by Step

What we recommend for clients building a BYOD program for ISO 27001 is the following sequence:

  1. Risk assessment first. Add BYOD to your ISMS risk register. Identify specific risks (data leakage, unauthorized access, lost devices) and define risk treatment options.

  2. Policy development. Write the BYOD policy and acceptable use agreement. Have legal review both documents, particularly the remote wipe and monitoring provisions.

  3. MDM selection and deployment. Select an MDM vendor that supports containerization on your target platforms. In our experience, the MDM decision should prioritize BYOD-specific features (work profile support, selective wipe, privacy controls) over enterprise device management features.

  4. Conditional access configuration. Configure your identity provider (Okta, Azure AD, Google Workspace) to enforce MDM enrollment as a condition of access. This prevents unmanaged personal devices from accessing company resources.

  5. Employee communication and enrollment. Communicate the BYOD program clearly, emphasizing both the benefits (use your preferred device) and the privacy protections (we cannot see your personal data). Run enrollment with IT support available.

  6. Continuous monitoring. Use MDM compliance dashboards and GRC platform integrations to monitor device compliance continuously. Generate evidence automatically for your audit.

  7. Integrate with offboarding. Ensure your offboarding process includes selective wipe of company data from personal devices. Automate this through HR system integration where possible.

Key Takeaways

  • What we tell clients is that ISO 27001 does not prohibit BYOD but requires you to manage BYOD risks through specific Annex A controls — A.8.1 (user endpoint devices), A.7.9 (security of assets off-premises), and A.5.10 (acceptable use) are the primary controls, and your implementation must address all of them
  • In our experience, MDM is effectively required for any BYOD program that needs to satisfy ISO 27001 auditors — it provides the enforcement mechanism for device security baselines, the containerization for data separation, and the evidence collection for audit readiness
  • What we recommend is treating the acceptable use agreement as the cornerstone of BYOD governance: it must be signed before device enrollment, clearly state monitoring scope, authorize selective wipe of company data, and define employee responsibilities for device security
  • In our experience, data separation through containerization is the most critical technical control for BYOD — it protects company data, preserves employee privacy, and enables selective wipe without affecting personal content
  • What we see most frequently in ISO 27001 audits is that BYOD findings stem from incomplete device inventories, missing acceptable use agreements, and failure to wipe company data during employee offboarding — all of which are preventable through MDM enrollment enforcement and process automation
  • We help our clients build BYOD programs that satisfy ISO 27001 requirements while maintaining employee trust, because a BYOD policy that employees circumvent is worse than no BYOD policy at all
Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.