How to Audit ISO 27001 Control 8.1: User Endpoint Devices

Auditing ISO 27001 Annex A 8.1 User Endpoint Devices is a technical validation of the security posture governing mobile and fixed hardware. The Primary Implementation Requirement is the central management of configuration and encryption, providing the Business Benefit of protecting sensitive data from unauthorised local access.

ISO 27001 Annex A 8.1 User Endpoint Devices Audit Checklist

This technical verification tool is designed for lead auditors to establish the security posture and management of end-user hardware. Use this checklist to validate compliance with ISO 27001 Annex A 8.1.

1. Endpoint Security Policy Formalisation Verified

Verification Criteria: A documented policy exists that explicitly defines the security requirements for user endpoint devices, including laptops, tablets, and smartphones.

Required Evidence: Approved “Endpoint Security Policy” or “Mobile Device Policy” with evidence of recent management review and staff distribution.

Pass/Fail Test: If the organisation cannot produce a formal policy specifying the technical standards for endpoint devices, mark as Non-Compliant.

2. Full Disk Encryption (FDE) Enforcement Confirmed

Verification Criteria: Technical controls are active on all managed endpoints to ensure that data remains inaccessible in the event of hardware loss or theft.

Required Evidence: MDM (Mobile Device Management) dashboard reports or Group Policy Object (GPO) settings showing BitLocker, FileVault, or equivalent status as “Enabled” for 100% of sampled devices.

Pass/Fail Test: If a sampled endpoint device containing organisational data is found with encryption disabled or unmanaged, mark as Non-Compliant.

3. Automated Idle-Time Screen Lock Validated

Verification Criteria: Managed devices are configured to automatically lock the screen after a defined period of inactivity to prevent unauthorised local access.

Required Evidence: MDM profiles or GPO reports showing mandatory screen-lock timeouts (e.g. 5–15 minutes) and a “password required on wake” setting.

Pass/Fail Test: If an auditor can access an unattended user device that has been idle for longer than the policy-defined period without a password prompt, mark as Non-Compliant.

4. Anti-Malware and Real-Time Protection Presence Confirmed

Verification Criteria: Endpoint Protection (EPP) or Endpoint Detection and Response (EDR) software is installed, active, and receiving regular signature or heuristic updates.

Required Evidence: EDR/AV central management console report showing “Healthy” status and recent update timestamps for all active endpoints.

Pass/Fail Test: If any managed device is identified as having disabled real-time protection or out-of-date definitions (greater than 48 hours), mark as Non-Compliant.

5. Remote Wipe capability and Execution Evidence Identified

Verification Criteria: The organisation possesses the technical capability to remotely sanitise or lock endpoint devices reported as lost or stolen.

Required Evidence: MDM “Command History” logs showing successful wipe or lock commands issued to decommissioned or lost devices.

Pass/Fail Test: If the organisation cannot technically execute a remote wipe on a sampled managed smartphone or laptop, mark as Non-Compliant.

6. Least Privilege (Standard User) Enforcement Verified

Verification Criteria: End-users operate with “Standard User” privileges on their primary devices, with administrative rights restricted to authorised IT personnel only.

Required Evidence: Local administrator group reports for a sampled batch of devices showing that non-IT staff accounts are excluded from administrative roles.

Pass/Fail Test: If a non-technical staff member is found to have local administrative privileges on their corporate laptop without an approved exception, mark as Non-Compliant.

7. Personal Device (BYOD) Management Alignment Confirmed

Verification Criteria: Where personal devices access corporate data, they are subject to management via containerisation or Mobile Application Management (MAM) controls.

Required Evidence: Intune/MAM configuration reports showing “App Protection Policies” enforced for corporate applications on personal assets.

Pass/Fail Test: If staff can download corporate emails or documents to unmanaged personal devices without technical restriction or containerisation, mark as Non-Compliant.

8. Peripheral and External Port Restriction Validated

Verification Criteria: Technical controls restrict the use of high-risk peripheral devices or unauthorised USB storage to prevent data exfiltration and malware ingress.

Required Evidence: MDM or EDR configuration logs showing USB “Read-Only” enforcement or a whitelist of approved external hardware.

Pass/Fail Test: If a standard user can mount an unencrypted, unmanaged USB drive and transfer corporate data to it, mark as Non-Compliant.

9. OS and Application Patch Compliance Monitoring Verified

Verification Criteria: Endpoints are monitored for vulnerabilities and are subject to a mandatory patching schedule for Operating Systems and critical third-party applications.

Required Evidence: Vulnerability management dashboard or patching logs showing “Compliant” status for critical security updates across the endpoint fleet.

Pass/Fail Test: If a device has failed to install “Critical” security patches older than 14 days without a documented technical justification, mark as Non-Compliant.

10. Secure Decommissioning and Sanitisation Records Present

Verification Criteria: Decommissioned or returned endpoint devices undergo a verified data sanitisation process before disposal or re-issue.

Required Evidence: Certificates of sanitisation (e.g. NIST 800-88 compliant) or technician logs cross-referenced against the Asset Register’s “Retired” status.

Pass/Fail Test: If a returned laptop is re-imaged or re-issued without a verified cryptographic erase or multi-pass wipe being recorded, mark as Non-Compliant.

Control RequirementThe ‘Checkbox Compliance’ TrapThe Reality Check
Device InventoryTool syncs with HR list and assumes every employee has “one laptop”.Verify Shadow IT. The auditor must check for devices in the MDM that aren’t in HR, and vice versa.
Encryption StatusGRC platform identifies “Policy.pdf” as evidence.Demand the FDE Report. Policy is intent; a live BitLocker compliance report from the MDM is evidence.
Patch ManagementTool records “Patching is enabled” via a static API check.Verify Stale Devices. GRC tools often ignore devices that haven’t synced in 30 days but still hold data.
BYOD ControlTool identifies a signed “BYOD Agreement” exists.Verify Containerisation. Test if a user can copy-paste data from a managed app (Outlook) to a personal app (Notes).
Privilege ReviewPlatform identifies IT staff as “Administrators”.Check the Standard Users. GRC tools often fail to flag that “Standard Users” can still disable local security agents.
Malware ProtectionTool confirms “AV is installed” on the device.Verify Signature Age. GRC tools miss that AV is useless if the agent hasn’t updated its definitions in months.
SanitisationPlatform marks a task as “Done” when an asset is retired.Demand the Certificate. A GRC “tick” does not prove that NIST-compliant wiping actually occurred.
Fay Barker - High Table - ISO27001 Director

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top