BYOD Security Architecture — System Configuration


Document Number: ISMS-CONF-BYOD-01

Classification: System Configuration

Version: 0.1.0

Effective Date: March 3, 2026

Author: Lucas Shin — Security Director

Parent Policy: BYOD Security Policy (ISMS-POL-BYOD-01)


1. Purpose & Scope

This System Configuration document provides the detailed platform architecture, technical control implementations, and data protection mechanisms for the BYOD security programme governed by BYOD Security Policy (ISMS-POL-BYOD-01).

Document positioning:


2. Platform Architecture

2.1 macOS BYOD — ADUE Architecture

ℹ️
macOS BYOD users access M365 via native desktop apps deployed to an isolated Managed Volume. App-level DLP (copy/paste blocking, save-as restriction) is not available on this platform — data protection relies on OS-level storage isolation, Conditional Access, and server-side controls.

macOS provides OS-level data isolation through Account-Driven User Enrollment (ADUE), which creates a dedicated APFS Managed Volume for all managed app data. This is a fundamentally different protection model from Windows BYOD (§2.2).

What is provided:

What is NOT available (platform limitations):

Accepted residual risk: Users can copy/paste data from managed apps to personal apps via the OS clipboard. This is accepted as residual risk — clipboard copying is a manual, per-item action that is inefficient for bulk data exfiltration. Compensating controls: user education, acceptable use obligations (ISMS-POL-BYOD-01 §5), NDA, and M365 audit logging.

Data protection model: Managed Volume isolation (file-level containment) + Conditional Access (auth-time device compliance) + Purview DLP (server-side content inspection). Unlike Windows Edge APP (§2.2), macOS has no app-level outbound data controls.

Design rationale: macOS provides stronger storage isolation (APFS Managed Volume) than any Windows BYOD option, and permits native M365 app access. The trade-off is the absence of app-level DLP. This asymmetry reflects the OS design philosophy difference: Apple optimises for BYOD data isolation; Microsoft optimises for corporate-owned device control. Cross-reference: M365 Workspace & Access Policy (ISMS-POL-M365-01) §6.1–§6.3 for the 3-policy CA architecture (CA-Require-AllApps-CompliantOrAPP, CA-Restrict-SPO-Unmanaged, CA-Permit-Guest-MFA).

2.2 Windows BYOD — Platform-Specific Restrictions

⚠️
Windows BYOD users are restricted to Managed Edge for M365 web app access by default. Office desktop apps are blocked unless the user opts into the BYOD Full MDM Exception Path (§2.3).

Windows lacks an OS-level data isolation mechanism equivalent to Apple's ADUE Managed Volume (WIP is deprecated with no replacement). As a result, Windows BYOD operates under the following constraints:

What is permitted:

What is blocked:

For users who require Office desktop app access on Windows, the BYOD Full MDM Exception Path (§2.3) is available. Cross-reference: M365 Workspace & Access Policy (ISMS-POL-M365-01) §6.1–§6.3 for the 3-policy CA architecture and platform-specific grant conditions.

2.3 BYOD Full MDM Exception Path — Mandatory Technical Controls

Upon enrolment in the Full MDM Exception Path (eligibility and approval: ISMS-POL-BYOD-01 §3.3.1), the following controls are applied via Intune:

ControlImplementationPurpose
Entra JoinDevice bound to organisation directory (Azure AD Join)Directory-level device identity and policy enforcement
Intune Full MDMFull device management, Compliance Policy, DefenderDevice compliance monitoring and security baseline
BitLocker + Key EscrowFull-disk encryption; recovery key stored in Entra IDStorage encryption; company retains Final Say for offboarding
OneDrive KFMDesktop / Documents / Pictures redirected to corporate OneDriveWork data cloud residency (folder-level sync; not equivalent to ADUE Managed Volume)
Standard UserLocal admin rights revoked via Intune policyPrevent tampering with security policies; personal app install via Microsoft Store permitted
CA PolicyCA-Require-AllApps-CompliantOrAPP — Compliant Device grant satisfied (replaces APP grant for this device)Grants desktop app access based on device compliance status

2.4 iOS/iPadOS & Android BYOD — Mobile Platform Architecture

Mobile BYOD is the most complete protection model. APP (App Protection Policy) is fully supported on both iOS/iPadOS and Android, providing app-level DLP (copy/paste blocking, save-as restriction, screenshot prevention). Combined with ADUE (iOS) or Work Profile (Android) for OS-level data isolation, there are no platform-level control gaps.

Mobile platforms provide both app-level and OS-level data protection — the only platform combination where this is fully available.

What is provided:

Data protection model: APP (app-level outbound DLP) + ADUE/Work Profile (OS-level storage isolation) + Conditional Access (auth-time device compliance) + Purview DLP (server-side content inspection).

No residual clipboard risk — unlike macOS (§2.1), APP enforces copy/paste blocking within managed apps on mobile platforms. No exception path is required. Cross-reference: M365 Workspace & Access Policy (ISMS-POL-M365-01) §6.1–§6.3 for the 3-policy CA architecture and platform-specific grant conditions.

2.5 System Architecture Overview

graph TD
    User["Employee Personal Device"]

    subgraph "macOS BYOD — ADUE (§2.1)"
        UE_mac["ADUE User Enrollment"] -->|"Managed Volume"| Apps_mac["Native M365 Apps (VPP)"]
        Comp_mac["Compliance Policy"] -->|"Monitoring"| OS_mac["OS/App Version Check"]
    end

    subgraph "Windows BYOD — Default Path (§2.2)"
        ER["Entra Registered + MAM"] -->|"Edge Only"| EdgeOnly["Managed Edge — M365 Web Apps"]
    end

    subgraph "Windows BYOD — Full MDM Exception (§2.3)"
        EJ["Entra Join + Full MDM"] -->|"Opt-in + Approval"| FullCtrl["Desktop Apps Permitted"]
        FullCtrl --> Controls["BitLocker + KFM + Standard User"]
    end

    subgraph "iOS/Android BYOD — APP + ADUE/Work Profile (§2.4)"
        UE_mobile["ADUE / Work Profile"] -->|"Logical Isolation"| Apps_mobile["Managed M365 Apps"]
        APP_mobile["App Protection Policy"] -->|"Full DLP"| Apps_mobile
        Comp_mobile["Compliance Policy"] -->|"Monitoring"| OS_mobile["OS/App Version Check"]
    end

    subgraph "Access Control — Entra ID"
        CA["Conditional Access"] -->|"Compliance Check"| Decision{"Compliant?"}
        Decision -->|"Yes"| Access["M365 and SaaS Access Granted"]
        Decision -->|"No"| Block["Access Blocked and Patch Prompted"]
    end

    subgraph "Self-Hygiene"
        Updatest["Updatest App"] -->|"User Action"| Manual["Personal App Update"]
        Log["Evidence Records"] -->|"Weekly Submission"| Admin["Security Audit Evidence"]
    end

    User --> UE_mac
    User --> ER
    User --> EJ
    User --> UE_mobile
    Apps_mac --> OS_mac
    OS_mac --> CA
    EdgeOnly --> CA
    Controls --> CA
    Apps_mobile --> OS_mobile
    OS_mobile --> CA

3. Data Protection Mechanisms

3.1 Data Ownership vs Management Jurisdiction

The ADUE Managed Volume and MAM policies define the company's technical management boundary — they do not define data ownership.

⚠️
"Managed Volume = Company Asset" is an incorrect and legally risky simplification. Data ownership is determined by the account used to create or access the data, not by the physical storage location.
ConceptDefinitionDetermined By
Management JurisdictionThe scope of what the company can technically control or wipeADUE Managed Volume / MAM policy enforcement
Data OwnershipWho holds intellectual property rights over the dataThe account context used to create or access the data

Ownership Determination:

3.2 MAM Control Scope

MAM (Mobile Application Management) is designed to prevent corporate data from leaving the managed boundary. It does not prevent personal data from entering the managed boundary.

What MAM DoesWhat MAM Does Not Do
Blocks copy/paste of corporate data to personal apps (iOS/Android only; macOS: APP not supported — see §2.1; Windows Edge: technically capable but intentionally allowed — same risk rationale as macOS, pending CISO approval, see §2.2)Control which accounts a user signs into within Managed Edge
Blocks M365 access from unmanaged browsers (CA: Require Managed Browser)Block personal SaaS access within Managed Edge
Restricts save-as / download within managed apps (Windows Edge + iOS/Android; macOS: not supported). Printing blocked on Windows Edge + iOS/Android (macOS: not enforceable)Distinguish between corporate vs personal accounts on the same SaaS

3.3 Selective Wipe and Personal Data Notice

If a user accesses personal SaaS services through Managed Edge, locally cached data from those sessions may reside within the Managed Volume. Upon Selective Wipe:

This notice must be included in the BYOD User Consent Form referenced in ISMS-POL-BYOD-01 §5.3.

4. Non-M365 App Security — Technical Controls

Scope: Technical control implementations for non-M365 apps that fall outside the direct control scope of APP (App Protection Policy) on BYOD devices. The core objective is to extend the gateway control principle (corporate information asset access through managed apps/browsers) to non-M365 apps. Per-app account operation policies, data context isolation, AI data sovereignty are defined in Application & Data Governance Policy (ISMS-POL-ADG-01).

4.1 Control Principles

  1. Enterprise App Registration and SSO: Non-M365 apps that process corporate information assets shall prioritise products that support SSO. When SSO is applied, the administrator (Security Director) registers the app as an Entra Enterprise App and grants Admin Consent. This routes user authentication through Entra ID, enabling authentication-time controls via Conditional Access.
  2. Managed Edge Routing Principle (Web Access): Extends the gateway control principle to non-M365 apps. When accessing the web version of a non-M365 app with a Corporate account, access shall be routed through Managed Edge. For SSO-enabled apps (item 1), CA enforces Managed Edge use at authentication time, blocking authentication from unmanaged browsers. For non-SSO apps, CA enforcement is not possible; Managed Edge usage is required by policy only.
      • Windows: Edge APP is applied, enabling outbound DLP (download blocking, save-as restriction, print blocking). Copy/paste is intentionally allowed (macOS parity — see §2.2).
      • macOS: VPP-deployed Edge serves as an authentication gateway only. APP is not supported; DLP is not applied — accepted as residual risk (see §2.1).
      • Mobile (iOS/Android): Edge APP is applied, enabling DLP (see §2.4).
  3. Native App Access Restrictions: When logging into a non-M365 native (desktop) app via SSO, authentication availability depends on the app's authentication popup implementation method.
      • System broker (WAM) integration: If the app processes login through the OS authentication broker, SSO authentication is possible via the active Managed Edge session.
      • Embedded Webview method: If the app processes login through its own built-in webview, it does not route through Managed Edge; authentication is blocked by CA → web version access only.
      • ⚠️ Even Category B (SSO-supported) apps may be unable to authenticate via native app depending on the authentication implementation. App-specific compatibility shall be verified at onboarding.
      • Native apps on computers do not have APP applied (except Windows Managed Edge), placing them outside app-level DLP scope. Compensated by §4.2 compensating controls.
  4. Account Separation Principle: Apps that hold corporate information assets must use separate Corporate and Personal accounts. Detailed account operation policies are defined in Application & Data Governance Policy (ISMS-POL-ADG-01).
  5. Information Asset Classification Linkage: Based on the sensitivity of data held by the app, apply the SaaS assessment criteria in §3 of Supplier & Third-Party Security Policy (ISMS-POL-STP-01) to perform High / Standard risk classification.

4.2 Compensating Controls

The following compensating controls are applied to areas where MAM technical controls are not in effect:

ControlMethodFrequency
Account separation compliance verificationUser self-assessment + administrator spot checkQuarterly
App security configuration verificationVerify 2FA activation and SSO integration statusAt app approval + annually
Data leakage preventionProhibition of corporate data transfer to personal accounts (policy-enforced)Ongoing
AI service usage controlsEnterprise/Team Plan mandatory for corporate data inputOngoing
Cross-reference: For detailed per-app account operation policies, data context isolation, and AI data sovereignty, refer to Application & Data Governance Policy (ISMS-POL-ADG-01).

5. Document Control

VersionDateAuthorChanges
0.1.02026-03-03Lucas ShinInitial release — Technical content extracted from ISMS-POL-BYOD-01 (v0.2.2). Platform architecture (§3.1–§3.4), data protection mechanisms (§6.3–§6.5), non-M365 app technical controls (§7.2–§7.3).

Review Schedule


[End of System Configuration]