Monitoring & Incident Response Procedure


Document Number: ISMS-PROC-BYOD-04

Version: 0.1.0

Parent Policy: BYOD Security Policy (ISMS-POL-BYOD-01)

Author: Lucas Shin — Security Director

Last Modified: February 18, 2026


1. Purpose

This procedure defines how BYOD-related security events are logged, monitored, and responded to — covering routine monitoring, threat detection, and incident response for device loss, theft, data breach, and malware scenarios.


2. Logging Scope

2.1 What Is Logged

Log SourceWhat It CapturesDefault Retention
Entra ID Sign-in LogsAll authentication attempts (success/failure), CA policy evaluation results, MFA events, location/IP30 days (exported quarterly to SharePoint)
Intune Compliance LogsDevice compliance status changes (Compliant ↔ Non-compliant), policy evaluation history30 days (exported quarterly to SharePoint)
Intune Device ActionsEnrollment, selective wipe, retire, sync events30 days (exported quarterly)
Defender for EndpointMalware detections, suspicious activity alerts, vulnerability assessments180 days (Defender portal)
Entra ID Audit LogsAdmin activities — CA policy changes, user/group changes, app registrations30 days (exported quarterly)

2.2 Long-term Retention

All logs are exported quarterly to SharePoint for a minimum 12-month retention period, meeting ISO 27001 evidence requirements.


3. Routine Monitoring

FrequencyActionWhat to Look ForOwner
DailyReview Entra ID sign-in logsFailed sign-ins, sign-ins from unusual locations/IPs, CA policy blocksLucas
DailyCheck Defender for Endpoint alertsMalware detections, high-severity vulnerability alertsLucas
DailyReview Intune Non-compliant devicesDevices that have fallen out of complianceLucas
WeeklyReview sign-in risk summaryTrends in risky sign-ins, repeat offenders, geographic anomaliesLucas
QuarterlyExport all logs to SharePoint archiveEnsure retention complianceLucas

4. Threat Detection and Response: Malware

4.1 Detection

4.2 Response Procedure

StepActionOwnerTimeline
1Defender alert received — assess severity (High / Medium / Low)LucasWithin 4 hours of alert
2High severity: Immediately block device access via CA (mark as non-compliant) and notify userLucasImmediate
3Investigate: Determine scope of threat, affected data, root causeLucasWithin 24 hours
4Remediation: Guide user to remove threat, update OS/apps, or perform selective wipe if neededLucas + End UserWithin 48 hours
5Verify device is clean and restore access (re-mark as compliant)LucasAfter remediation confirmed
6Document incident in Incident RegisterLucasWithin 72 hours
7If high severity or data breach: Escalate to CISOLucas → RichardWithin 24 hours of confirmation

5. Incident Response: Device Loss or Theft

StepActionOwnerTimeline
1User reports device loss/theft to Security Director via any available channelEnd UserWithin 24 hours of discovery
2Security Director initiates selective wipe (work data only) via IntuneLucasImmediately upon report
3Disable user's Entra ID sign-in (block all access) as precautionLucasImmediately
4Assess data exposure risk: What corporate data was on the device? Was the device encrypted?LucasWithin 24 hours
5If data breach is suspected: Escalate to CISO for breach notification assessmentLucas → RichardWithin 24 hours
6If device recovered: Re-evaluate compliance before restoring accessLucasAs applicable
7If device not recovered: Remove from Intune, user enrolls replacement deviceLucas + End UserPer Device Lifecycle Procedure
8Document incident in Incident RegisterLucasWithin 72 hours
Important: Only selective wipe is performed — company cannot and should not perform a full device wipe on BYOD. The user is responsible for their own device recovery/insurance.

6. Incident Response: Data Breach (Suspected)

StepActionOwnerTimeline
1Incident detected or reported (e.g., corporate data found in unauthorized location, user admits to policy violation)AnyoneImmediately
2Security Director assesses scope: What data? How much? How sensitive?LucasWithin 24 hours
3Contain: Block affected user/device access, selective wipe if neededLucasImmediately upon assessment
4Escalate to CISO with incident summary and recommended actionsLucas → RichardWithin 24 hours
5CISO determines: External notification required? Legal/regulatory obligations?RichardWithin 48 hours
6Root cause analysis and remediation actionsLucasWithin 7 days
7Document in Incident Register, update procedures if neededLucasWithin 14 days

7. Incident Register

All security incidents must be recorded in the Incident Register with:

The Incident Register is maintained in SharePoint and reviewed quarterly as part of management review.

8. Evidence Retention

Evidence TypeRetention PeriodStorage Location
Entra ID sign-in logs12 months (exported quarterly)SharePoint
Intune compliance/device action logs12 months (exported quarterly)SharePoint
Defender for Endpoint alerts180 days (portal) + exported quarterlyDefender portal + SharePoint
Incident RegisterMinimum 3 yearsSharePoint

9. Periodic Review


[End of Procedure]