User endpoint devices are where most attacks succeed.
They sit at the boundary between people, networks, and data — and they are routinely outside direct organisational control.
Annex A 8.1 exists to ensure organisations protect information processed, stored, or accessed on user endpoint devices, reducing the risk of compromise, loss, or misuse.
This control is about bringing discipline to laptops, mobiles, and tablets, not assuming central controls are enough.

Annex A 8.1 of ISO 27001:2022 focuses on security of user endpoint devices.
At a practical level, this means:
The control does not mandate specific technologies. It expects clear rules, appropriate technical controls, and informed user behaviour.
Endpoint devices are frequently targeted because they:
Common incidents include:
Annex A 8.1 ensures organisations treat endpoint devices as high-risk information assets, not just IT equipment.
This control consolidates and expands earlier mobile device and unattended equipment controls from ISO 27001:2013 into a single, comprehensive requirement.
A pragmatic approach to Annex A 8.1 typically includes the following elements.
Organisations should define a topic-specific policy covering:
The policy should be clear, accessible, and aligned with risk.
Endpoint devices should be identifiable and managed.
This often includes:
Unknown devices create unmanaged risk.
Devices should be configured to reduce exposure.
Controls may include:
Configuration should be consistent and managed, not ad hoc.
Endpoint devices are a common malware entry point.
Organisations should consider:
Endpoints should not bypass core security controls.
Uncontrolled software increases risk.
Organisations should define:
Outdated software is a predictable weakness.
Endpoint devices frequently connect to external networks.
Controls may include:
Network exposure should be assumed, not ignored.
Information stored locally increases exposure.
Annex A 8.1 supports:
Protection should follow information sensitivity.
Where risk justifies it, organisations may:
Remote controls reduce impact when devices are lost.
Endpoint devices may hold unique or critical information.
Organisations should consider:
Loss of an endpoint should not equal loss of data.
Annex A 8.1 explicitly relies on informed user behaviour.
Users should understand:
Technology reduces risk.
Behaviour determines whether controls are effective.
Where personal devices are permitted, Annex A 8.1 expects organisations to consider additional risks.
This may include:
BYOD is not prohibited — but unmanaged BYOD creates legal and security exposure.
Annex A 8.1 does not require:
It does require organisations to:
Endpoint security fails most often through assumption, not lack of tooling.
Endpoints are where policy meets reality.
Annex A 8.1 is about controlling the most exposed part of the information environment.
When user endpoint devices are managed effectively:
Attackers rarely start in the data centre.
They start with a user endpoint.
Annex A 8.1 ensures organisations are prepared for that reality.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today