BYOD Architecture โ€” CISO Decision Brief

To: Richard Williams (CISO)

From: Lucas Shin (Security Director)

Date: 2026-02-25

Purpose: Decisions required on BYOD architecture direction and residual risk acceptance


๐Ÿ“Ž
Background data: For full technical analysis, see ๐Ÿšง BYOD Security Architecture โ€” Platform Asymmetry Analysis (Backdata)

1. Why This Brief Exists

Our BYOD security architecture has a fundamental asymmetry between macOS and Windows due to how each OS handles personal device management. This asymmetry affects data protection mechanisms, user experience, and how we explain our security posture to auditors and clients.

This document distils the technical analysis into the decisions that require CISO sign-off before we can finalise the BYOD policy and procedures.


2. The Asymmetry โ€” What You Need to Know

Why it exists

What this means in practice

macOS BYODWindows BYOD (Default)
M365 accessNative apps (Outlook, Teams, Office)Edge web apps only
Storage isolationโœ… Managed Volume (APFS)โŒ None
Copy/paste protectionโŒ Cannot block (OS limitation)โš™๏ธ Blockable by policy (APP)
File download protectionโœ… Isolated in Managed Volumeโš™๏ธ Blockable by policy (APP)
On offboardingManaged Volume wipedEdge org data removed

The core gap: macOS has file isolation but an open clipboard. Windows has clipboard control but no native apps.

Key security finding (validated 2026-02-23)

Concern that third-party apps could bypass macOS Managed Volume isolation has been resolved. Server-side Entra ID controls (Enterprise App Registration + Admin Consent Required + User Assignment) block unauthorised apps from obtaining M365 tokens entirely. This strengthens the security argument for the current macOS approach.


3. Architecture Options

Case 1: Symmetric (Both Edge-only)Case 2: Asymmetric (Current direction)
WindowsEdge APP (as-is)Edge APP (as-is)
macOSEdge-only + MDA session controlADUE + native apps
Copy/pasteWin โœ… / Mac โœ…Win โš™๏ธ / Mac โŒ
Native appsWin โŒ / Mac โŒWin โŒ / Mac โœ…
Additional costโš ๏ธ MDA licence ~$10/user/monthNone
Policy complexityOne unified narrativeTwo platform narratives
Case 3 (both platforms native apps, no restrictions) was rejected โ€” Windows native app access allows file downloads to the personal area with no isolation, enabling file-level data exfiltration.

Important nuance on "symmetry"

Even in Case 1, file download handling remains asymmetric: macOS allows downloads into the Managed Volume (isolated), while Windows must block downloads entirely (no isolation). Security outcome is equivalent (no file exfiltration either way), but user experience differs โ€” macOS users can work with downloaded files locally, Windows users cannot.

Residual risks (Cases 1 & 2)


4. Decision Required

Architecture Direction โ€” Case 1 vs Case 2

Question: Which architecture should we adopt?

Recommendation: Case 2 (asymmetric) is the current direction.

Case 1 offers cleaner policy narrative but sacrifices macOS native app experience and requires MDA licensing. Defender for Cloud Apps (MDA) is not included in Business Premium โ€” requires a standalone licence or Defender Suite add-on (~$10/user/month). MDA is only needed for BYOD under Case 1. (MDA may still be relevant for other use cases, but that is outside BYOD scope.)

If Case 2 โ€” Copy/Paste Parity Approval Required

If Case 2 is selected, copy/paste is allowed on both platforms:

Approve the following Windows BYOD (Managed Edge) APP settings:

SettingValueRationale
Download to localBlockNo OS-level isolation
Save-as to unmanaged storageBlockNo OS-level isolation
Copy/paste to unmanaged appsAllowParity with macOS (see below)
PrintBlockAlternative: forward as PDF via Outlook
โš ๏ธ
Why this needs CISO approval: Copy/paste blocking is technically possible on Windows via APP. We are choosing not to apply it for the reasons outlined in ยง3 (R1 vs R2 relationship). This is an intentional non-application of an available control and requires documented CISO sign-off.

Compensating controls in place: MFA, Conditional Access, Exchange DLP, Safe Links/Attachments, FileVault, sync period limits.

SharePoint / OneDrive External Sharing โ€” Restrict to Internal Only

What is this about?

When employees store files in Microsoft 365, those files live in two places:

Both SPO and ODB have a setting that controls who employees can share files with. By default, Microsoft allows sharing with anyone outside the organisation โ€” including creating links that don't even require a login.

What's the risk?

If external sharing is open, any employee can share any file with anyone outside the company by creating a sharing link from SharePoint or OneDrive โ€” bypassing the Teams channel workflow where sharing is controlled by Team Owners.

This is not an issue today (all 3 current users are administrators), but becomes a real risk when non-admin members join.

What are the options?

OptionWhat it meansRisk level
Anyone (anonymous links)Anyone with the link can access โ€” no login required๐Ÿ”ด Very high โ€” no audit trail
New and existing guestsEmployees can invite external people and create guest accounts๐ŸŸก Medium โ€” any member can create new guests
Existing guests onlySharing only with guests already approved by an admin๐ŸŸข Low โ€” admin controls who gets access
Only people in your organizationNo external sharing via SPO/ODB at all๐ŸŸข Lowest

How would external sharing still work?

If we choose "Only people in your organization", employees who need to share files externally can still:

  1. Send as email attachment via Outlook (subject to Exchange DLP rules)
  2. Invite a guest to a Teams channel (Team Owner approval required)

Both routes are tracked, auditable, and controlled by admin/owner permissions.

Recommendation: Set both SPO and ODB to "Only people in your organization"

โœ…
Approve: SPO and ODB external sharing = "Only people in your organization" as the baseline. Future relaxation to "Existing guests only" requires CISO approval.

Business Basic Users โ€” Email Security Gap Assessment

What is this about?

When we set up email security controls (DLP rules, advanced threat protection), the tools available depend on the user's licence.

This means BB users only have baseline protection (Exchange Online Protection โ€” known malware, phishing, and spam filtering) and no DLP policy tips when sending emails containing sensitive information.

What's at stake?

Two capabilities that BP users will have but BB users will not:

CapabilityWhat it doesBB gapStandalone cost
Purview DLP (Exchange)Detects sensitive data (ID numbers, financial info) in outgoing emails and shows a warning to the senderNo DLP at all โ€” no add-on availableN/A (no standalone SKU)
Defender for O365 P1Safe Links (URL scanning at click time) + Safe Attachments (sandbox analysis) โ€” protects against phishing and zero-day malware beyond EOP baselineEOP only โ€” no Safe Links/Attachments$2.00/user/month

Why does this matter now?

Today all 3 active users are on Business Premium, so this gap doesn't exist yet. However, when the team grows and some members are assigned BB licences (e.g. resource accounts or cost-optimised seats), those users will have weaker email security than BP users.

The long-term plan is to move all users to Business Premium when partner benefits are fully activated โ€” but until then, BB users represent a known gap.

Decision required (2 items):

1๏ธโƒฃ
BB Purview DLP โ€” Accept that BB users will have no email DLP (no policy tips, no sensitive data detection), or require all email-enabled users to be on BP.
2๏ธโƒฃ
BB Defender for O365 P1 โ€” Accept EOP-only protection for BB users, or purchase Defender P1 standalone ($2.00/user/month) for BB email-enabled users.
๐Ÿ“‹
Context: Both items are low urgency today (no BB email users exist). They become actionable when the first BB-licensed member with an active mailbox is onboarded. The recommended trigger is to revisit these decisions as part of the onboarding checklist.

Windows Native App Access on BYOD โ€” Not Permitted

Current position: Windows native desktop apps (Teams, Outlook, Office) are not permitted on BYOD under the current architecture. This applies regardless of Case 1 or Case 2 selection.

Why this is not a future option under current licensing:

One potential path to enabling Windows native apps would be Microsoft Purview Sensitivity Labels โ€” if all Confidential data were labelled with encryption, local cache exposure from native apps would be mitigated. However, auto-labeling is not available on Business Premium:

CapabilityBusiness PremiumE5 / Purview Add-on
Manual sensitivity labelsโœ…โœ…
Encryption + Rights Managementโœ…โœ…
Client-side auto-labelingโŒโœ…
Service-side auto-labelingโŒโœ…
Teams Chat DLPโŒโœ…
Endpoint DLPโŒโœ…

Without auto-labeling, protection depends entirely on users manually applying labels โ€” unlabelled data remains unencrypted in local cache (Teams: %AppData%\Microsoft\Teams, Outlook: OST cache file). Manual-only labeling cannot be relied upon as a security control.

โ„น๏ธ
Terminology update: Azure Information Protection (AIP) Unified Labeling add-in retired April 2024. The successor is Microsoft Purview Information Protection with built-in labeling in M365 Apps. Licensing requirements for auto-labeling remain unchanged (E5 or Purview add-on required).

Prerequisite for future reconsideration:

Until either condition is met, Windows BYOD remains Edge-only (Managed Edge with APP). This is not a discretionary policy choice โ€” it is a licensing-constrained architectural requirement.


5. References