Device Lifecycle Procedure


Document Number: ISMS-PROC-BYOD-01

Version: 0.1.3

Parent Policy: BYOD Security Policy (ISMS-POL-BYOD-01)

Author: Lucas Shin — Security Director

Last Modified: February 25, 2026

Change Summary (v0.1.3): §6 — Windows MAM-only device review sources clarified (Entra ID Registered Devices + APP reports). Cross-references to Asset Management Policy §3.3/§4.3.2 and Standard Definition §6.5 updated.


1. Purpose

This procedure defines the end-to-end lifecycle of BYOD devices — from initial enrollment through device changes to offboarding — ensuring that corporate data is protected at every stage while respecting the user's personal device ownership.


2. Enrollment Procedure

2.1 Pre-requisites

2.2 Enrollment by Platform

PlatformEnrollment MethodIsolation MechanismWhat Happens
macOSUser Enrollment via Apple Business Manager (ABM)Separate APFS volume for work dataWork domain created; personal data untouched
iOS / iPadOSUser Enrollment via ABMManaged apps run in isolated containerCompany can manage/delete work app data only
AndroidWork Profile enrollmentSeparate "work space" containerComplete isolation from personal area
Windows (Default)Entra Registered + MAMEdge browser-level isolation (MAM)M365 web app access via Managed Edge only; no desktop apps
Windows (Full MDM)Entra Join + Intune Full MDMDevice-level management (no OS volume isolation)Desktop app access enabled; BitLocker + KFM + Standard User enforced. Requires §2.4 procedure.

2.3 Enrollment Steps

StepActionOwner
1User requests BYOD enrollment via email/Teams to Security DirectorEnd User
2Security Director verifies license assignment and consent form completionLucas
3Security Director sends enrollment instructions (platform-specific)Lucas
4User completes enrollment on device (Intune Company Portal / Settings)End User
5Intune automatically deploys mandatory managed apps via VPPAutomated
6Security Director verifies device appears as "Compliant" in Intune dashboardLucas

2.4 Windows Full MDM Enrollment Steps (§3.2 Exception Path)

This procedure applies only to Windows users approved for the BYOD Full MDM Exception Path per parent policy §3.2.

StepActionOwner
1User submits written request for desktop app access with business justificationEnd User
2Security Director evaluates request and approves/denies; records decision in exception registerLucas
3User signs BYOD Full MDM Consent Form (separate from standard BYOD Consent Form)End User
4Security Director provides Entra Join enrollment instructionsLucas
5User performs Entra Join (Settings → Accounts → Access work or school → Connect → Join this device to Azure Active Directory)End User
6Intune Full MDM enrollment completes automatically upon Entra JoinAutomated
7Security Director verifies: (a) BitLocker enabled + recovery key escrowed to Entra ID, (b) OneDrive KFM active, (c) Standard User enforced, (d) Compliance Policy reporting “Compliant”Lucas
8Security Director updates CA policy to grant device compliance-based access (Require Compliant Device)Lucas
9User confirms Office desktop apps (Teams, Outlook, Word) are accessibleEnd User
Evidence: Signed BYOD Full MDM Consent Form, Intune device record, BitLocker recovery key confirmation, exception register entry.

3. Managed App Deployment

3.1 Mandatory Apps (Auto-deployed via VPP)

AppPurposeDeployment
Microsoft TeamsCommunication & collaborationVPP — Required
Microsoft OutlookCorporate emailVPP — Required
Microsoft EdgeManaged browser for SaaS accessVPP — Required
Intune Company PortalDevice management interfaceVPP — Required

3.2 Optional Apps


4. Device Change Procedure

When an employee replaces or adds a new personal device:

StepActionOwner
1User notifies Security Director of device changeEnd User
2Security Director initiates selective wipe on old device (work data only)Lucas
3Old device removed from Intune inventoryLucas
4User enrolls new device per Section 2.3 enrollment stepsEnd User
5Security Director verifies new device complianceLucas

4.1 Full MDM Device Change (Windows §3.2 Exception Path)

When a Windows Full MDM user replaces their device:

StepActionOwner
1User notifies Security Director of device changeEnd User
2Security Director initiates Selective Wipe on old device; if fails, Full Wipe via BitLocker keyLucas
3Old device removed from Entra ID and Intune; BitLocker recovery key purgedLucas
4User enrolls new device per §2.4 Full MDM enrollment steps (existing Consent Form remains valid)End User
5Security Director verifies all controls on new device (BitLocker, KFM, Standard User, Compliance)Lucas

5. Offboarding Procedure (Termination / Departure)

StepActionOwnerTimeline
1HR/Manager notifies Security Director of employee departureHR / ManagerAs early as possible, minimum 1 business day before last day
2Security Director initiates selective wipe (work data only) via IntuneLucasEmployee's last working day
3Disable user's Entra ID account (blocks all M365/SaaS access immediately)LucasEmployee's last working day
4Remove device from Intune inventoryLucasWithin 24 hours of last day
5Revoke M365 license assignmentLucasWithin 7 days
6Confirm with departing employee that personal data is intact (optional courtesy)LucasLast day
Important (Standard BYOD): Only a selective wipe (work data only) is performed on standard BYOD devices. A full device wipe is never performed — the device belongs to the employee.

5.1 Full MDM Offboarding (Windows §3.2 Exception Path)

For Windows devices enrolled under the BYOD Full MDM Exception Path, the offboarding procedure includes escalation to Full Wipe as consented by the user.

StepActionOwnerTimeline
1HR/Manager notifies Security Director of employee departureHR / ManagerMinimum 1 business day before last day
2Security Director initiates Selective Wipe via Intune (remove corporate apps, accounts, policies)LucasEmployee’s last working day
3If Selective Wipe succeeds: proceed to Step 5. If fails (device offline, tampered, etc.): proceed to Step 4LucasWithin 24 hours
4Full Wipe (factory reset) using escrowed BitLocker recovery key, as consented in Opt-in AgreementLucasWithin 48 hours of last day
5Disable user’s Entra ID accountLucasEmployee’s last working day
6Remove device from Entra ID and Intune; purge BitLocker recovery keyLucasWithin 24 hours
7Revoke M365 license; update exception register with offboarding date and wipe method usedLucasWithin 7 days
Note: Full Wipe is a last resort and only executed when Selective Wipe has failed. The user’s prior Opt-in Consent (BYOD Full MDM Consent Form) provides the legal basis for this action. All wipe actions are logged in the Intune audit trail and recorded in the exception register.

6. Device Inventory Review

ISO 27001 Annex A.8.1 requires that endpoint devices accessing corporate data are identified and managed. For BYOD devices, the authoritative device inventory varies by platform enrolment type. This section defines the periodic review procedure to ensure the inventory remains accurate.

⚠️
Platform-specific inventory sources:
  • macOS (ADUE) / iOS / Android: Intune Devices inventory (장치가 Intune에 직접 등록됨)
  • Windows MAM-only (Default): Intune Devices에 장치가 나타나지 않음 → Entra ID → Devices → Registered Devices + Intune → App Protection Policy (APP) reports 병행 확인 필요
  • Windows Full MDM: Intune Devices inventory (Entra Joined 장치로 등록됨)

6.1 Review Schedule

FrequencyActivityOwner
QuarterlyFull Intune device inventory review (aligned with Risk Register quarterly review)Security Director
On eventReview triggered by personnel change, security incident, or significant policy updateSecurity Director

6.2 Review Steps

StepActionOwner
1aIntune-enrolled devices: Export device list from Intune (Devices → All devices) — covers macOS ADUE, iOS, Android, Windows Full MDMSecurity Director
1bWindows MAM-only devices: Export registered device list from Entra ID → Devices (filter: Registered). Cross-reference with Intune → Apps → App protection policies → [Policy] → User report to confirm active MAM usageSecurity Director
2Cross-check enrolled/registered devices against active employee list — identify devices belonging to departed users or unknown ownersSecurity Director
3Identify non-compliant devices (Compliance Status ≠ Compliant) and devices inactive for 90+ days. For Windows MAM-only: check APP report for last sync dateSecurity Director
4For stale or orphaned devices: initiate selective wipe and remove from IntuneSecurity Director
5For non-compliant devices: contact user, set 14-day remediation deadline. If unresolved, block access via CA and escalate per BYOD Policy §6Security Director
6Record review outcome: date, total devices, actions taken, unresolved itemsSecurity Director

6.3 Audit Evidence

When an ISO 27001 auditor requests the BYOD device inventory:

  1. Device list — Live export from Intune (Devices → All devices → Export)
  2. Compliance status — Intune Compliance dashboard screenshot
  3. Review record — Quarterly review log (date, findings, actions)
Note: Individual BYOD devices are not registered in the Information Asset Register. BYOD device inventory is maintained for access control purposes (compliance enforcement, offboarding, audit, stale device cleanup). See Asset Management Policy (ISMS-POL-ASM-01) §3.3 and §4.3.2 for discovery methodology, and Information Asset Identification — Standard Definition (ISMS-STD-ASM-01) §6.5 for scope rationale.

7. Evidence and Records

RecordRetentionStorage
Enrollment confirmation (Intune device record)Duration of employment + 12 monthsIntune / Exported to SharePoint
Signed BYOD User Consent FormDuration of employment + 12 monthsSharePoint (HR folder)
Selective wipe confirmation12 monthsIntune audit log / SharePoint
Offboarding checklist completion12 monthsSharePoint
Signed BYOD Full MDM Consent FormDuration of employment + 12 monthsSharePoint (HR folder)
BitLocker recovery key escrow confirmationUntil device offboarded + 90 daysEntra ID / Exported to SharePoint
Full Wipe confirmation (if executed)12 monthsIntune audit log / SharePoint
Exception register entry (Full MDM approval)Duration of employment + 12 monthsSharePoint

[End of Procedure]