Use promo code:
CTA20

Expert Advice Community

Guest

Controls and Clauses Related to BYOD

  Quote
Guest
Guest post Created:   Jan 12, 2016 Last commented:   Jan 12, 2016

Controls and Clauses Related to BYOD

Hi I am new to ISO 27001 and still learning, so kindly excuse if the question appears to be lame or vague. I wanted to know that 1) What are the clauses and controls related to BYOD. 2)How should we approach BYOD from the ISO 27001 perspective and what are things to keep in mind while doing so. 3) What should be the Risk Management approach for a BYOD solution. I think that it does not come under the mandatory documents.   Thanks and Best Regards Ravi
0 0

Assign topic to the user

ISO 27001 FOUNDATIONS COURSE

Everything you need to know about ISO 27001.

ISO 27001 FOUNDATIONS COURSE

Everything you need to know about ISO 27001.

Guest
Guest post Jan 12, 2016

Hi Ravi

All questions are good questions if they allow you to better understand.

The first issue is that ISO 27001 is not the good place to look, as your question has no relation with the ISMS processes, but with the controls in Annex A. You need to go to ISO 27002 that explains how to implement these controls. In your situation, it is highly recommended to read ISO 27002.

You could have a look at this blog post : ISO 27001 vs. ISO 27002 (https://advisera.com/27001academy/knowledgebase/iso-27001-vs-iso-27002/

1)     There are, sadly, no controls on BYOD (understanding ‘personal electronic devices brought at work’) in ISO 27002. You can’t easily control it. The explanation in clause 6.2.1 (Mobile device policy) in ISO 27002 would help you further.

2)     The only approach from ISO 27001 is risk management and defining the adequate policy. E.g.:

No classified information will be transmitted to and from BYOD equipment.
The use of BYOD to take pictures, audio and video recording must be authorised by the management.
The company will install software on mobile devices enabling it to delete the company information remotely.

3)     Risk management approach is described in ISO 27005. The main risks are: there comes ‘professional’ information on a non controlled device through received emails, photos, videos and audio recording. Then: who may access this information around the user and what if it’s lost or stolen?

Finally, you’re right it’s not a mandatory control. This blog post gives the point : List of mandatory documents required by ISO 27001 (2013 revision) - https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Jan 12, 2016

Jan 12, 2016

Suggested Topics