A.8.1 User Endpoint Devices
What is A.8.1 User Endpoint Devices?
Endpoint devices are the most common entry point for cyber attacks. If your devices are not enrolled, encrypted, and monitored, your compliance programme has a critical gap. ISO 27001 control A.8.1 User endpoint devices requires organisations to ensure that information processed by, stored on, or accessed through user devices is properly protected.
This is important because almost all sensitive information can be accessed. This clause addresses the security risks associated with endpoint devices such as laptops, smartphones, tablets, and other user-operated hardware that connect to organizational systems. These devices are often mobile, diverse, and harder to control, making them vulnerable to threats like unauthorized access, data loss, or theft.
How to implement A.8.1 in Microsoft 365
Implementing ISO 27001 Annex A 8.1
Implementing ISO 27001 Annex A 8.1 (User endpoint devices) involves establishing a topic-specific Endpoint Security Policy and enforcing technical controls to protect information stored on, processed by, or accessible via laptops, desktops, mobiles and tablets. Define scope (corporate and BYOD), register all devices in an asset inventory, and require hardening baselines (encryption at rest, anti‑malware/EDR, personal firewall, screen lock, auto‑patching). Manage devices through MDM/endpoint management (e.g., Intune) with compliance policies for OS versions, encryption, tamper protection and jailbreak/root detection.
Restrict software installation to approved apps
Restrict software installation to approved apps, control removable media, and require secure network use (VPN where needed). Enable remote wipe/lock for loss/theft, back‑ups where applicable, and apply access controls (MFA, conditional access) tied to device compliance.
Provide user guidance for handling
Provide user guidance for handling, travel and storage; include BYOD rules and privacy notices. Monitor device posture and logs, remediate promptly, and review the policy and controls periodically based on risk and incidents.
What an auditor checks for A.8.1
- Auditors will look for a documented Endpoint Security/Acceptable Use Policy covering device registration, configuration standards, encryption, malware protection, patching, software restrictions, removable media, remote wipe/lock, network use and BYOD rules.
- They will sample devices and MDM/endpoint management dashboards to verify enforcement (e.g., encryption enabled, EDR active, up‑to‑date patches, compliant OS versions) and check asset inventory accuracy.
- They will review conditional access or equivalent controls that restrict access to sensitive services to compliant devices, examine logs and alerts for device non‑compliance or loss/theft, and confirm incident response actions (e.g., remote wipe).
- Evidence of user awareness communications, periodic reviews, and exceptions handled through risk acceptance/change control is expected.
What your auditor expects for A.8.1
- endpoint device security controls including device compliance status
- disk encryption (BitLocker/FileVault)
- Microsoft Defender for Endpoint onboarding
- Conditional Access policy enforcement
Related controls
See how your organisation scores against A.8.1 and all 93 ISO 27001 controls.
Get Your Free AssessmentM365 capabilities that implement this control
CIS M365 v6.0.1 Intune hardening: SecureByDefault, personal enrollment, Entra join, device quota, LAPS
Conditional Access policies requiring device compliance
Intune enrollment and management for Windows devices
Intune enrollment and management for macOS devices
Intune enrollment and management for Android devices
Intune enrollment and management for iOS devices
Microsoft Defender for Endpoint EDR on Windows devices
Microsoft Defender for Endpoint on macOS devices
MCP server authentication (Device Flow, API keys), least-privilege tool exposure, connectivity monitoring