BYOD Architecture โ CISO Decision Brief
To: Richard Williams (CISO)
From: Lucas Shin (Security Director)
Date: 2026-02-25
Purpose: Decisions required on BYOD architecture direction and residual risk acceptance
1. Why This Brief Exists
Our BYOD security architecture has a fundamental asymmetry between macOS and Windows due to how each OS handles personal device management. This asymmetry affects data protection mechanisms, user experience, and how we explain our security posture to auditors and clients.
This document distils the technical analysis into the decisions that require CISO sign-off before we can finalise the BYOD policy and procedures.
2. The Asymmetry โ What You Need to Know
Why it exists
- Apple (macOS): Designed for BYOD. Account-Driven User Enrollment (ADUE) creates a separate encrypted volume (Managed Volume) that isolates all work data from personal data at the OS level.
- Microsoft (Windows): Designed for corporate-owned devices. No OS-level data isolation for BYOD. After WIP deprecation, the only BYOD protection is Intune App Protection Policies (APP) applied to Managed Edge โ limiting access to web apps only.
What this means in practice
| macOS BYOD | Windows BYOD (Default) | |
|---|---|---|
| M365 access | Native apps (Outlook, Teams, Office) | Edge web apps only |
| Storage isolation | โ Managed Volume (APFS) | โ None |
| Copy/paste protection | โ Cannot block (OS limitation) | โ๏ธ Blockable by policy (APP) |
| File download protection | โ Isolated in Managed Volume | โ๏ธ Blockable by policy (APP) |
| On offboarding | Managed Volume wiped | Edge org data removed |
The core gap: macOS has file isolation but an open clipboard. Windows has clipboard control but no native apps.
Key security finding (validated 2026-02-23)
Concern that third-party apps could bypass macOS Managed Volume isolation has been resolved. Server-side Entra ID controls (Enterprise App Registration + Admin Consent Required + User Assignment) block unauthorised apps from obtaining M365 tokens entirely. This strengthens the security argument for the current macOS approach.
3. Architecture Options
| Case 1: Symmetric (Both Edge-only) | Case 2: Asymmetric (Current direction) | |
|---|---|---|
| Windows | Edge APP (as-is) | Edge APP (as-is) |
| macOS | Edge-only + MDA session control | ADUE + native apps |
| Copy/paste | Win โ / Mac โ | Win โ๏ธ / Mac โ |
| Native apps | Win โ / Mac โ | Win โ / Mac โ |
| Additional cost | โ ๏ธ MDA licence ~$10/user/month | None |
| Policy complexity | One unified narrative | Two platform narratives |
Case 3 (both platforms native apps, no restrictions) was rejected โ Windows native app access allows file downloads to the personal area with no isolation, enabling file-level data exfiltration.
Important nuance on "symmetry"
Even in Case 1, file download handling remains asymmetric: macOS allows downloads into the Managed Volume (isolated), while Windows must block downloads entirely (no isolation). Security outcome is equivalent (no file exfiltration either way), but user experience differs โ macOS users can work with downloaded files locally, Windows users cannot.
Residual risks (Cases 1 & 2)
- R1 โ Clipboard copy/paste (Case 2 only): Manual, per-instance. Low volume exfiltration risk.
- R2 โ Screenshots (all cases): Cannot be blocked on desktop BYOD. Any data visible on screen can be captured.
- R1 vs R2 relationship: Even if copy/paste is blocked (Case 1), the same data is exfiltrable via screenshots. Eliminating R1 does not eliminate the underlying exposure โ it only removes one of two channels for the same data.
4. Decision Required
Architecture Direction โ Case 1 vs Case 2
Question: Which architecture should we adopt?
Recommendation: Case 2 (asymmetric) is the current direction.
- Leverages each platform's strengths โ macOS volume isolation, Windows APP controls
- No additional cost
- ADUE server-side controls validated โ security posture is strong
- R1 (clipboard) is low risk, and R2 (screenshot) exists regardless
Case 1 offers cleaner policy narrative but sacrifices macOS native app experience and requires MDA licensing. Defender for Cloud Apps (MDA) is not included in Business Premium โ requires a standalone licence or Defender Suite add-on (~$10/user/month). MDA is only needed for BYOD under Case 1. (MDA may still be relevant for other use cases, but that is outside BYOD scope.)
If Case 2 โ Copy/Paste Parity Approval Required
If Case 2 is selected, copy/paste is allowed on both platforms:
- macOS: Cannot block โ OS limitation (residual risk R1)
- Windows: Blockable by APP but intentionally not applied โ parity with macOS
Approve the following Windows BYOD (Managed Edge) APP settings:
| Setting | Value | Rationale |
|---|---|---|
| Download to local | Block | No OS-level isolation |
| Save-as to unmanaged storage | Block | No OS-level isolation |
| Copy/paste to unmanaged apps | Allow | Parity with macOS (see below) |
| Block | Alternative: forward as PDF via Outlook |
Compensating controls in place: MFA, Conditional Access, Exchange DLP, Safe Links/Attachments, FileVault, sync period limits.
SharePoint / OneDrive External Sharing โ Restrict to Internal Only
What is this about?
When employees store files in Microsoft 365, those files live in two places:
- SharePoint (SPO) โ team files, shared through Teams channels
- OneDrive (ODB) โ personal work files, each person's own space
Both SPO and ODB have a setting that controls who employees can share files with. By default, Microsoft allows sharing with anyone outside the organisation โ including creating links that don't even require a login.
What's the risk?
If external sharing is open, any employee can share any file with anyone outside the company by creating a sharing link from SharePoint or OneDrive โ bypassing the Teams channel workflow where sharing is controlled by Team Owners.
This is not an issue today (all 3 current users are administrators), but becomes a real risk when non-admin members join.
What are the options?
| Option | What it means | Risk level |
|---|---|---|
| Anyone (anonymous links) | Anyone with the link can access โ no login required | ๐ด Very high โ no audit trail |
| New and existing guests | Employees can invite external people and create guest accounts | ๐ก Medium โ any member can create new guests |
| Existing guests only | Sharing only with guests already approved by an admin | ๐ข Low โ admin controls who gets access |
| Only people in your organization | No external sharing via SPO/ODB at all | ๐ข Lowest |
How would external sharing still work?
If we choose "Only people in your organization", employees who need to share files externally can still:
- Send as email attachment via Outlook (subject to Exchange DLP rules)
- Invite a guest to a Teams channel (Team Owner approval required)
Both routes are tracked, auditable, and controlled by admin/owner permissions.
Recommendation: Set both SPO and ODB to "Only people in your organization"
- Closes the direct external sharing path entirely
- Forces all external collaboration through controlled channels (email or Teams guest invite)
- Can be relaxed to "Existing guests only" later if a specific business need arises
- No impact on current operations โ all 3 current users are admins who can adjust settings if needed
Business Basic Users โ Email Security Gap Assessment
What is this about?
When we set up email security controls (DLP rules, advanced threat protection), the tools available depend on the user's licence.
- Business Premium (BP) users get Purview DLP and Defender for Office 365 P1 included
- Business Basic (BB) users get neither โ and there is no add-on path for DLP (the standalone AIP P1 licence was discontinued in January 2024)
This means BB users only have baseline protection (Exchange Online Protection โ known malware, phishing, and spam filtering) and no DLP policy tips when sending emails containing sensitive information.
What's at stake?
Two capabilities that BP users will have but BB users will not:
| Capability | What it does | BB gap | Standalone cost |
|---|---|---|---|
| Purview DLP (Exchange) | Detects sensitive data (ID numbers, financial info) in outgoing emails and shows a warning to the sender | No DLP at all โ no add-on available | N/A (no standalone SKU) |
| Defender for O365 P1 | Safe Links (URL scanning at click time) + Safe Attachments (sandbox analysis) โ protects against phishing and zero-day malware beyond EOP baseline | EOP only โ no Safe Links/Attachments | $2.00/user/month |
Why does this matter now?
Today all 3 active users are on Business Premium, so this gap doesn't exist yet. However, when the team grows and some members are assigned BB licences (e.g. resource accounts or cost-optimised seats), those users will have weaker email security than BP users.
The long-term plan is to move all users to Business Premium when partner benefits are fully activated โ but until then, BB users represent a known gap.
Decision required (2 items):
Windows Native App Access on BYOD โ Not Permitted
Current position: Windows native desktop apps (Teams, Outlook, Office) are not permitted on BYOD under the current architecture. This applies regardless of Case 1 or Case 2 selection.
Why this is not a future option under current licensing:
One potential path to enabling Windows native apps would be Microsoft Purview Sensitivity Labels โ if all Confidential data were labelled with encryption, local cache exposure from native apps would be mitigated. However, auto-labeling is not available on Business Premium:
| Capability | Business Premium | E5 / Purview Add-on |
|---|---|---|
| Manual sensitivity labels | โ | โ |
| Encryption + Rights Management | โ | โ |
| Client-side auto-labeling | โ | โ |
| Service-side auto-labeling | โ | โ |
| Teams Chat DLP | โ | โ |
| Endpoint DLP | โ | โ |
Without auto-labeling, protection depends entirely on users manually applying labels โ unlabelled data remains unencrypted in local cache (Teams: %AppData%\Microsoft\Teams, Outlook: OST cache file). Manual-only labeling cannot be relied upon as a security control.
Prerequisite for future reconsideration:
- Microsoft Purview Information Protection and Governance Add-on for Business Premium becomes available with auto-labeling support, OR
- Licence tier upgrade to E3/E5
Until either condition is met, Windows BYOD remains Edge-only (Managed Edge with APP). This is not a discretionary policy choice โ it is a licensing-constrained architectural requirement.
5. References
- ๐ง BYOD Security Architecture โ Platform Asymmetry Analysis (Backdata) โ Full technical analysis
- [Domain Context] Security Architecture โ ยง1.1, ยง1.5, ยง1.7, ยง3.6
- BYOD Security Policy โ ยง7 Application & Data Governance
- BYOD Quick Reference โ Platform User Guide โ End-user facing summary