ISO 27001:2022 Annex A 8.1 – User Endpoint Devices Explained

User endpoint devices are where most attacks succeed.
They sit at the boundary between people, networks, and data — and they are routinely outside direct organisational control.

Annex A 8.1 exists to ensure organisations protect information processed, stored, or accessed on user endpoint devices, reducing the risk of compromise, loss, or misuse.

This control is about bringing discipline to laptops, mobiles, and tablets, not assuming central controls are enough.

ISO 27001

Quick Guide: Annex A 8.1 at a Glance

Annex A 8.1 of ISO 27001:2022 focuses on security of user endpoint devices.

At a practical level, this means:

  • Defining how endpoint devices are configured and used
  • Protecting information on laptops, mobiles, and tablets
  • Reducing risk from loss, theft, malware, and unauthorised access
  • Clarifying user responsibilities
  • Addressing both organisational and personal (BYOD) devices

The control does not mandate specific technologies. It expects clear rules, appropriate technical controls, and informed user behaviour.

In-Depth Guide to Annex A 8.1

What Is Annex A 8.1 and Why Does It Matter?

Endpoint devices are frequently targeted because they:

  • Are portable and easily lost or stolen
  • Operate outside secure premises
  • Interact directly with users and email
  • Bridge trusted networks and untrusted environments

Common incidents include:

  • Malware introduced via phishing
  • Data loss from stolen or misplaced devices
  • Unauthorised access due to weak configuration
  • Insecure use of public networks

Annex A 8.1 ensures organisations treat endpoint devices as high-risk information assets, not just IT equipment.

This control consolidates and expands earlier mobile device and unattended equipment controls from ISO 27001:2013 into a single, comprehensive requirement.

How to Implement Annex A 8.1 Effectively

A pragmatic approach to Annex A 8.1 typically includes the following elements.

1. Establish a User Endpoint Device Policy

Organisations should define a topic-specific policy covering:

  • Permitted device types
  • Approved uses of endpoint devices
  • Information that may be processed or stored
  • Security requirements for configuration and use

The policy should be clear, accessible, and aligned with risk.

2. Register and Manage Endpoint Devices

Endpoint devices should be identifiable and managed.

This often includes:

  • Registering organisational devices
  • Identifying users responsible for devices
  • Maintaining visibility of device ownership and status

Unknown devices create unmanaged risk.

3. Apply Secure Configuration and Access Controls

Devices should be configured to reduce exposure.

Controls may include:

  • Strong authentication
  • Access controls aligned with role and need
  • Automatic locking when unattended
  • Encryption of storage media

Configuration should be consistent and managed, not ad hoc.

4. Protect Devices Against Malware and Attack

Endpoint devices are a common malware entry point.

Organisations should consider:

  • Malware protection controls
  • Secure configuration baselines
  • Restrictions on unauthorised software installation
  • Monitoring or detection capabilities

Endpoints should not bypass core security controls.

5. Control Software Installation and Updates

Uncontrolled software increases risk.

Organisations should define:

  • Rules for installing software
  • How updates and patches are applied
  • Responsibilities for maintaining device security

Outdated software is a predictable weakness.

6. Address Use of Networks and Connectivity

Endpoint devices frequently connect to external networks.

Controls may include:

  • Rules for connecting to public or home networks
  • Secure access mechanisms
  • Restrictions on insecure wireless connections

Network exposure should be assumed, not ignored.

7. Protect Information Stored on Endpoint Devices

Information stored locally increases exposure.

Annex A 8.1 supports:

  • Encrypting storage media
  • Restricting local storage of sensitive information
  • Segregating organisational information from other data

Protection should follow information sensitivity.

8. Enable Remote Protection and Recovery

Where risk justifies it, organisations may:

  • Disable devices remotely
  • Remove organisational data
  • Support recovery following loss or theft

Remote controls reduce impact when devices are lost.

9. Define Backup Expectations

Endpoint devices may hold unique or critical information.

Organisations should consider:

  • Backup requirements for endpoint data
  • Risks introduced by unreliable connectivity
  • Responsibilities for ensuring backups occur

Loss of an endpoint should not equal loss of data.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

User Responsibilities and Awareness

Annex A 8.1 explicitly relies on informed user behaviour.

Users should understand:

  • Their responsibility to protect devices physically
  • Expectations for locking and securing devices
  • Risks of using devices in public or shared spaces
  • The need to report loss, theft, or suspected compromise promptly

Technology reduces risk.
Behaviour determines whether controls are effective.

Bring Your Own Device (BYOD) Considerations

Where personal devices are permitted, Annex A 8.1 expects organisations to consider additional risks.

This may include:

  • Separation of organisational and personal data
  • Consent for security controls such as remote wiping
  • Clarification of ownership and intellectual property rights
  • Legal limits on accessing personal devices
  • Software licensing implications

BYOD is not prohibited — but unmanaged BYOD creates legal and security exposure.

Practical Considerations

Annex A 8.1 does not require:

  • Banning endpoint devices
  • Identical controls for every role
  • Heavy-handed monitoring of users

It does require organisations to:

  • Recognise endpoint devices as high-risk assets
  • Define clear rules and responsibilities
  • Apply proportionate technical and organisational controls

Endpoint security fails most often through assumption, not lack of tooling.

Common Challenges and How to Overcome Them

  • Treating endpoints as low-risk user tools
  • Classify and manage them as information assets
  • Inconsistent configuration across devices
  • Apply defined configuration standards
  • Unclear responsibility for personal devices
  • Define BYOD rules and obtain informed consent
  • Ignoring public and remote use scenarios
  • Address off-premises and mobile risk explicitly

Endpoints are where policy meets reality.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 8.1 is about controlling the most exposed part of the information environment.

When user endpoint devices are managed effectively:

  • Malware and compromise risk is reduced
  • Data loss impact is limited
  • User behaviour aligns with security expectations
  • Security extends beyond the office and network perimeter

Attackers rarely start in the data centre.
They start with a user endpoint.

Annex A 8.1 ensures organisations are prepared for that reality.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls