Access Control & Data Protection Procedure


Document Number: ISMS-PROC-BYOD-03

Version: 0.1.3

Parent Policy: BYOD Security Policy (ISMS-POL-BYOD-01)

Author: Lucas Shin — Security Director

Last Modified: March 1, 2026


Document Control

VersionDateAuthorChanges
0.1.02026-02-18Lucas ShinInitial release — platform-specific access pathways, MAM controls, CA architecture, data protection procedures
0.1.12026-02-20Lucas ShinUpdated CA architecture: added SPO site permissions as primary access scope limiter. Added Windows BYOD copy/paste parity decision (risk accepted). Clarified ADUE data protection model (APP not supported on macOS).
0.1.22026-03-01Lucas ShinPhase 2-5 ISMS mapping: CA architecture restructured to 3-policy model (Error #37 correction). SPO/ODB access control clarified (site permissions + Session Control). Cross-references to ISMS-POL-M365-01 §6.3 added.
0.1.32026-03-01Lucas ShinAdded CA 3-Policy Evaluation Flow Mermaid diagram to §2.3 (detailed flowchart: Assignment → Grant → Session Control). GuestOK label corrected to "M365 접근 허용 (MFA 필수, 네이티브 앱 포함)".

1. Purpose

This procedure defines:


2. Access Control

2.1 Platform-Specific Access Pathways

PlatformM365 AccessNon-M365 SaaSTechnical Basis
macOS (ADUE)Native apps (Teams, Outlook, Word, etc.) + Managed EdgeManaged EdgeADUE (Account-Driven User Enrollment) Managed Volume + VPP. APP not supported on macOS — data protection via volume isolation, not app-level DLP.
iOS / AndroidManaged apps (Teams, Outlook, etc.) + Managed EdgeManaged EdgeMAM (App Protection Policy)
Windows BYOD (Default)Managed Edge → M365 web apps onlyManaged EdgeMAM (Edge-only) + CA
Windows BYOD (Exception)Native desktop apps + Managed EdgeManaged EdgeEntra Join + Full MDM (see Section 2.4)
⚠️ Windows BYOD limitation: Windows MAM only covers Managed Edge. Office desktop apps (Teams, Outlook, Word, etc.) cannot receive MAM protection. The default pathway therefore restricts M365 access to web apps via Managed Edge only.

2.2 Managed Edge Controls

ControlEnforcementTechnical Mechanism
Dedicated BrowserAll SaaS access must go through Managed Microsoft EdgeIntune App Configuration Policy (macOS/iOS: VPP (Volume Purchase Program) deployment; Windows/Android: Intune app deployment)
Unmanaged Browser BlockCorporate SaaS access via Safari, Chrome, Firefox, etc. is blockedConditional Access — Require App Protection Policy
Browser Data ProtectionAll activities within Edge are governed by App Protection PolicyIntune App Protection Policy

2.3 Conditional Access (CA) Architecture

CA 3-Policy Evaluation Flow

The following diagram illustrates how Conditional Access policies evaluate user access requests to M365 services. The evaluation order is: Assignment (who is the user?) → Grant (device/app compliance) → Session Control (SPO/ODB restrictions).

flowchart TD
    Start["🔐 사용자가 M365 접근 시도"] --> Assignment{"📋 Assignment 평가<br>(누구인가?)"}
    Assignment -->|"Break-glass 계정"| BG["✅ 모든 정책 Exclude<br>→ 무제한 접근"]
    Assignment -->|"Guest (#EXT#)"| GuestPolicy{"정책 2<br>CA-Permit-Guest-MFA<br>MFA 충족?"}
    GuestPolicy -->|"Yes"| GuestOK["✅ M365 접근 허용<br>(MFA 필수, 네이티브 앱 포함)"]
    GuestPolicy -->|"No"| GuestBlock["❌ 차단"]
    Assignment -->|"내부 사용자"| P1{"정책 1<br>CA-Require-AllApps-CompliantOrAPP<br>Grant 평가"}
    P1 --> OR{"Compliant Device<br>**OR**<br>App Protection Policy?"}
    OR -->|"macOS ADUE<br>→ Compliant ✅"| Pass["✅ Grant 통과"]
    OR -->|"Windows MAM Edge<br>→ APP ✅"| Pass
    OR -->|"Windows Full MDM<br>→ Compliant ✅"| Pass
    OR -->|"미충족"| Block["❌ 차단<br>(별도 Block 정책 불필요)"]
    Pass --> SPO{"SPO / ODB<br>접근인가?"}
    SPO -->|"아니오"| Done["✅ 접근 허용"]
    SPO -->|"예"| P3{"정책 3<br>CA-Restrict-SPO-Unmanaged<br>Session Control 평가"}
    P3 --> Managed{"디바이스 상태?"}
    Managed -->|"Managed<br>(macOS ADUE,<br>Windows Full MDM)"| Full["✅ 전체 기능<br>download/print 허용"]
    Managed -->|"Unmanaged<br>(Windows MAM Edge)"| Restricted["⚠️ 제한 접근<br>download/print 차단"]
    style Block fill:#ff6b6b,color:#fff
    style GuestBlock fill:#ff6b6b,color:#fff
    style BG fill:#51cf66,color:#fff
    style Done fill:#51cf66,color:#fff
    style Full fill:#51cf66,color:#fff
    style GuestOK fill:#74c0fc,color:#fff
    style Restricted fill:#ffd43b,color:#333

Device & App Control

PolicyConditionResult
Require App Protection PolicyAccess attempt via unmanaged app or browserAccess blocked — forces managed app/browser (Managed Edge)
Require MFAAll sign-insMFA prompt

Data Access Control (SharePoint / OneDrive)

Corporate data is protected by two layers: (1) SPO site permissions = Teams membership — users can only access SharePoint sites for teams they belong to, even via direct URL; (2) CA policies enforce device/app compliance and restrict actions on unmanaged devices.

PolicyTargetGrant / SessionResult
CA-Require-AllApps-CompliantOrAPPAll users, all cloud appsRequire Compliant Device OR Require APPmacOS: ADUE compliant ✅ / Windows Edge: APP ✅ / Unmanaged: blocked
CA-Restrict-SPO-UnmanagedAll users, SPO + ODBSession: "Use app enforced restrictions"Unmanaged devices: download/sync/print blocked (browser-only view)
CA-Permit-Guest-MFAExternal Guests (#EXT#)Require MFAGuest access with MFA; scope limited to channel membership

2.4 Windows BYOD — Default Path vs Exception Path

PathEnrollmentM365 AccessEligibility
DefaultEntra Registered + MAMManaged Edge → M365 web apps onlyAll Windows BYOD users
Exception (Full MDM)Entra Joined + Intune Full MDMOffice desktop apps allowedUser request (Opt-in) + Security Director approval

Exception Path — Required Technical Controls:

  1. BitLocker + Key Escrow — Full disk encryption; recovery key stored in Entra ID. Provides the organisation with final authority over storage, enabling lock/wipe at offboarding.
  2. OneDrive KFM (Known Folder Move) — Desktop, Documents, and Pictures folders redirected to corporate OneDrive. ⚠️ KFM is cloud sync for specific folders, not OS-level volume isolation like macOS ADUE.
  3. Standard User Enforcement — Local admin rights removed. Prevents tampering with security policies (BitLocker, KFM, Intune).

Exception Path — Prerequisite:


3. Data Protection

3.1 MAM (Mobile Application Management) Controls by Platform

ControlDescriptionmacOS (ADUE)iOS / AndroidWindows BYOD
Cut/Copy/Paste BlockPrevents copying corporate data from managed apps into personal apps❌ Not supported — APP not available on macOS; Managed Pasteboard not supported on macOS desktop apps✅ All managed appsAllowed — Risk accepted (macOS parity: clipboard is per-instance manual copy with low exfiltration efficiency; screenshot channel remains open on both platforms regardless). Pending CISO approval.
Screenshot BlockBlocks screen capture within managed apps⚠️ Limited✅ Android (enforced) / ⚠️ iOS (watermark only)❌ Not supported
Save-As RestrictionCorporate files can only be saved to managed storage (OneDrive / SharePoint)❌ No app-level enforcement — APP not supported on macOS. Managed Volume provides storage isolation only (not active save-as policy).✅ All managed apps✅ Edge only — Blocked (no OS-level storage isolation)
Download to LocalPrevents downloading corporate files to local storage✅ Allowed — downloads go to Managed Volume (APFS isolation)✅ Blocked within managed apps (save to OneDrive/SharePoint only)✅ Edge only — Blocked (no OS-level storage isolation; local download = personal area)
PrintPrevents printing corporate content from managed apps❌ Not enforceable — APP not supported on macOS✅ Configurable per APP✅ Edge only — Blocked (alternative: export to PDF → send via Outlook)
Biometric AuthenticationFace ID / Fingerprint required to launch managed work apps
Offline Access TimeoutRe-authentication required after period without connectivity✅ Edge only
⚠️ MAM Common Limitations (all platforms):
- No inbound control: Cannot prevent personal data from entering the managed area
- No account filtering: Cannot inspect or block which SaaS account a user logs into within Managed Edge
- No personal browser blocking: Personal browser use (Safari, Chrome, Edge personal profile) is permitted by BYOD design — corporate SaaS access is blocked by CA, not by device-level browser restrictions

3.2 macOS Data Protection (ADUE)

3.3 Windows BYOD Data Protection

Default Path (Managed Edge Only):

Exception Path (Full MDM):

3.4 iOS / Android Data Protection


4. Exception App Approval

Note: For Windows BYOD users requiring Office desktop app access, see Section 2.4 (Exception Path — Full MDM). This section covers exceptions for third-party SaaS tools not available through the managed Edge pathway.

When a user requires access to a SaaS tool not covered by the managed Edge pathway:

StepActionOwner
1User submits request specifying the app, business justification, and data types accessedEnd User
2Security Director evaluates risk: Does the app handle corporate data? Can it be managed via MAM?Lucas
3If approved, Security Director configures the app as a managed app (if possible) or documents compensating controlsLucas
4Exception recorded per parent policy Section 7 (Exception Handling)Lucas

5. Operational Routine

FrequencyActionOwner
DailyReview CA sign-in logs for blocked/failed access attempts — investigate anomaliesLucas
WeeklyReview App Protection Policy status — confirm all managed apps are policy-compliantLucas
QuarterlyAudit SaaS application inventory — verify no shadow IT access outside managed pathwaysLucas

6. Evidence Retention

Evidence TypeRetention PeriodStorage Location
Conditional Access sign-in logsDefault 30 days in Entra ID; exported quarterlySharePoint
App Protection Policy reportsMinimum 12 months (exported quarterly)SharePoint
Exception approvalsDuration of exception + 12 monthsSharePoint

7. Periodic Review


[End of Procedure]