Rhand Leal
September 7, 2015
One would expect that ISO 27001, the leading information security standard, would have strict requirements regarding BYOD. However, you would be surprised – such requirements do not exist, and what’s more, BYOD is ever mentioned in the standard.
BYOD is, of course, unavoidable in a modern company, so how do you make yourself compliant with ISO 27001?
BYOD stands for Bring Your Own Device, referring to a trend where employees make use of their own personal devices (e.g., smartphones, laptops, tablets, USB drives, etc.) to connect to their employers’ organizations’ networks and information systems.
Main reasons for to adopting BYOD in companies are related to:
Main risks related to the adoption of BYOD are:
To achieve the benefits of BYOD, while minimizing the potential risks of information compromise, organizations define rules for the use of personal devices in the workplace in documents commonly called a BYOD policy.
By adopting and communicating a BYOD policy, organizations define boundaries for access and use of personal devices, as well as potential consequences to employees for the misuse of information and damages to the organization’s networks and information systems.
First, let’s see which ISO 27001 controls are the closest to BYOD.
A.6.2.1 Mobile device policy – this control requires development of a security policy for using mobile devices in order to reduce risks. Therefore, the BYOD policy must be based on identified risks.
A.6.2.2 Teleworking – since employees’ personal mobile devices are used not only in company offices, but also at home, this control is also applicable for BYOD. The control requires the implementation of security measures for information access, processing, and storage – this means that the BYOD policy must cover all of those three areas.
A.13.2.1 Information transfer policies and procedures – this control requires writing documentation for the protection of information that is transferred through any communication equipment, including employees’ personal mobile devices. So, if you didn’t write separate policies or procedures for information transfer, you can cover these requirements in the BYOD policy.
A.13.2.3 Electronic messaging – again, if you didn’t define through some other document how electronic messages will be protected, then the BYOD policy is the right place to do it.
There are some other controls that are not so directly related to BYOD, like A.8.1.3 Acceptable use of assets (defining rules on how each asset is to be used), A.8.2.3 Handling of assets (defining rules on which protection measures are to be used according to information classification), and at least a dozen other controls. However, I think the four controls I listed above are the most relevant in terms of BYOD, so let’s focus on them.
Creating a 20-page policy with detailed rules that will cover every security detail might seem attractive to you, but believe me, it’s not going to work.
When starting to write this policy, you should keep the main goal in mind: to change the behavior of the BYOD users in your company. And, if you want to change someone’s behavior, especially if this change involves the hassle of using some additional security rules, then you need to make the rules easily understandable and short. See also: Seven steps for implementing policies and procedures.
So, from the perspective of the ISO 27001 controls I listed above, in your BYOD policy you should cover the following:
The following items would be useful in the BYOD policy as well:
So, to conclude, although ISO 27001 is not very focused on the Bring Your Own Device concept, taking its appropriate controls can be quite helpful when writing the BYOD policy. And remember: documents are not important; changing the people’s behavior is. Therefore, keep your documents short and simple.
To use a wizard to build your BYOD policy, sign up for a 14-day free trial of Conformio, the leading ISO 27001 compliance software.