ISO 27001:2022 Annex A 8.1 User endpoint devices

ISO 27001 Annex A 8.1 User Endpoint Devices

In this guide, I will show you exactly how to implement ISO 27001 Annex A 8.1 and ensure you pass your audit. You will get a complete walkthrough of the control, practical implementation examples, and access to the ISO 27001 templates and toolkit that make compliance easy.

I am Stuart Barker, an ISO 27001 Lead Auditor with over 30 years of experience conducting hundreds of audits. I will cut through the jargon to show you exactly what changed in the 2022 update and provide you with plain-English advice to get you certified.

Key Takeaways: ISO 27001 Annex A 8.1 User Endpoint Devices

ISO 27001 Annex A 8.1 requires organizations to protect the information stored on, processed by, or accessible via user endpoint devices (laptops, desktops, smartphones, tablets). Because these devices are portable and often used in unmanaged environments (homes, cafes), they present a significant risk of loss, theft, or unauthorized access. The goal is to implement a multi-layered defence, combining technical tools, strict policies, and user awareness, to secure every “entry point” to your corporate network.

Core requirements for compliance include:

  • Comprehensive Asset Inventory: You cannot protect what you don’t know exists. You must maintain a real-time list of all company-issued and personal devices (BYOD) used for work.
  • The “Security Trifecta”: At a bare minimum, auditors expect to see Full Disk Encryption (BitLocker/FileVault), Endpoint Protection (Antivirus/EDR), and Managed Patching on every device.
  • Endpoint Management (MDM/UEM): Use tools like Microsoft Intune or Jamf to enforce security baselines, such as auto-lock timers, password complexity, and the ability to Remote Wipe a lost device.
  • Physical Security Training: Users must be educated on “public space etiquette”, never leaving a laptop unattended and using privacy screens to prevent “shoulder surfing” in open areas.
  • BYOD Governance: If you allow personal phones or laptops, you must use “containerization” (like Outlook Work Profiles) to keep company data separate and deletable without wiping the user’s personal photos.

Audit Focus: Auditors will look for “The Live Verification”:

  1. Spot Checks: An auditor might ask a random employee to share their screen and show that their Antivirus is “Green” and their hard drive is encrypted.
  2. MDM Dashboard: “Show me your Intune or Jamf dashboard. How many devices are currently ‘Non-Compliant’ and what is your process for fixing them?”
  3. The Leaver Test: “Show me the record for the last person who left the company. How did you verify their device was returned or wiped?”

Device Compliance Matrix (Managed vs. BYOD):

Requirement Corporate Device (Managed) Personal Device (BYOD)
Control Level Full MDM Agent (Deep control). App Container (Light control).
Data Security Full device encryption mandatory. Work-app encryption required.
Data Wipe Full Remote Wipe capability. Selective Wipe (Work data only).
App Access Restricted to Company Portal. Open (with work app isolation).

Key Takeaways

  • Asset management is required so you understand what must be protected.
  • The installation of anti-virus, anti-malware and encryption are a must.
  • It is called ISO27001:2022 Annex A 8.1 User End Point Devices.

What is ISO 27001 User Endpoint Device Security?

Endpoint devices are the devices and equipment that people use to get the job done and they need protecting. This control is about the protection of endpoint devices and to secure and protect the data that they process, store and transmit.

It is important because endpoint devices are typically harder to manage as people are a lot more mobile. In the mobile economy it is difficult to predict the environment in which the endpoint device will be used and as a result difficult to predict the risks that you would need to mitigate.

Devices that connect to systems and data present a specific risk to information security due to their diversity and number.

ISO 27001 User Endpoint Devices is the control of those end point devices. This ISO 27001 annex a control sets out the requirement to implement technical and administrative controls to ensure that data and systems are protected.

In ISO 27001 this is known as ISO27001:2022 Clause 8.1 User Endpoint Devices.

What is ISO 27001 Annex A 8.1?

The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022).

In the ISO/IEC 27001:2022 Standard the control is titled “User Endpoint Device Security”.

The ISO 27001 standard defines ISO 27001 Annex A 8.1 as:

Information stored on, processed by or accessible via user endpoint devices should be protected.

ISO 27001:2022 Annex A 8.1 User Endpoint Device Security
ISO 27001 Annex A 8.1 User Endpoint Device Security - Control Objective
ISO 27001 Annex A 8.1 User Endpoint Device Security – Control Objective

ISO 27001 Annex A 8.1 Purpose

The purpose of ISO 27001 Annex A 8.1 User Endpoint Devices is to protect information against the risks introduced by using user endpoint devices. More specifically it wants you to make sure you have controls in place to protect devices that store, process or transmit data.

Examples of endpoint devices include

  • Desktop computers
  • Laptops
  • Smartphones
  • Tablets
  • Other connected devices used to access company systems, such as POS terminals or IoT devices.
ISO 27001 Annex A 8.1 User Endpoint Device Security - User endpoint devices defined
ISO 27001 Annex A 8.1 User Endpoint Device Security – User endpoint devices defined

ISO 27001 Annex A 8.1 Free Training Video

In the video ISO 27001 User Endpoint Devices Explained – ISO27001:2022 Annex A 8.1 I show you how to implement it and how to pass the audit.

ISO 27001 Annex A 8.1 Explainer Video

In this beginner’s guide to ISO 27001 Annex A 8.1 User Endpoint Device Security, ISO 27001 Lead Auditor Stuart Barker and his team talk you through what it is, how to implement in and how to pass the audit.

ISO 27001 Annex A 8.1 Podcast

In this episode: Lead Auditor Stuart Barker and team do a deep dive into the ISO 27001 Annex A 8.1 User Endpoint Device Security. The podcast explores what it is, why it is important and the path to compliance.

ISO 27001 Annex A 8.1 Implementation Guidance

Now let me share with you some best practice when it comes to implementation in this step-by-step implementation guide.

ISO 27001 Annex A 8.1 User Endpoint Device Security -implementation framework introduction
ISO 27001 Annex A 8.1 User Endpoint Device Security -implementation framework introduction

1. Establishing an Endpoint Device Security Policy

A starting point is the create of a topic specific policy that clearly sets out what you expect to happen. A topic specific policy on the secure configuration and use of devices is the starting point.

ISO 27001 Annex A 8.1 User Endpoint Device Security -  implementation framework pillar 1 - governance and foundation
ISO 27001 Annex A 8.1 User Endpoint Device Security – implementation framework pillar 1 – governance and foundation

2. Maintain a Comprehensive Asset Inventory

You need to have good asset management processes in place so that you know what end points you have and what needs to be protected. This is a common mistake we see where people do not know the devices they have an allow any device to connect to the organisation. We counter this with strong asset management as we covered in ISO 27001 Annex A 5.9 Inventory of information and other associated assets

3. Essential Security Controls for User Devices

In this day and age you would need a compelling reason not to have the basic technical controls of encryption and protection against malware software installed. These are a first line of defence. Consideration for layering on top of that endpoint device management solutions that give you more control over what the device can and cannot do is now common place. Where the ability to remote lock or remote wipe a device is available this should also be considered.

Examples of relevant technical controls include

  • Encryption: Encrypt the hard drives and data stored on user devices to protect against loss or theft. 


  • Antivirus and Anti-Malware: Install and maintain antivirus software with up-to-date definitions on all applicable endpoints. 
  • Configuration Management: Implement secure baseline configurations, such as those from CIS Benchmarks or DISA STIGs, to protect workstations. 
  • Data Loss Prevention (DLP): Use solutions to control the use of portable storage devices like USB drives and prevent sensitive data from leaving the organisation. 
  • Endpoint Device Management (EDM) tools: Deploy tools to enforce security policies, manage devices remotely, and provide functionalities like remote wipe for lost or stolen devices. 
ISO 27001 Annex A 8.1 User Endpoint Device Security - implementation framework pillar 2 - technical controls
ISO 27001 Annex A 8.1 User Endpoint Device Security – implementation framework pillar 2 – technical controls

4. The Importance of Employee Training and Awareness

A large section of the guidance on this control concerns user responsibility, and rightly so. There is a lot of trust being placed in the users of these devices. Your role here is setting out what is expected, advising, communicating, training and educating. To tell people not to do silly things like leave these devices unattended, or worse case unattended and logged in. That they should be protected against theft and logged out of when not in use. More detail on education, training and awareness is provided in ISO 27001 Annex A 6.3 Information Security Awareness Education and Training.

ISO 27001 Annex A 8.1 User Endpoint Device Security - implementation framework pillar 3 - human and physical controls
ISO 27001 Annex A 8.1 User Endpoint Device Security – implementation framework pillar 3 – human and physical controls

5. Implement Physical Security Controls

The role of endpoint devices needs to take account of ISO 27001 Annex A 7.5 Protecting Against Physical and Environmental Threats. Even if you have no offices which we covered in ISO 27001 Physical Security Controls When You Have No Office there are physical security controls that are required. You are going to educate users not to leave devices unattended in public places and consider:

  • Screen protectors
  • Device auto locking after a set period of time
  • Locks as appropriate
  • Lockable storage for home locations
  • Shredders for home locations

6. “Bring Your Own Device” (BYOD) Governance

People in smaller organisations really like using their own devices. It is not ideal but is also something that can be overcome. You will consider the technical controls that are in your gift and how they can mitigate risks. Example of access over VPN, or terminal equivalent access can work. Having either manual or automated checks that the devices at least have the basics of malware protection, encryption and are patched to the latest version would be expected. The real kicker here is that legislation often works against you if you allow a personal device as you probably cannot do what you think you can do. An example of this would be thinking you can remote wipe a personal device or ask to view the contents of a personal device. It is easy to allow, but a little a tricker to manage and usually the best course of action is to dig deep in those pockets and find the money to get a work device the person can use.

ISO 27001 Annex A 8.1 User Endpoint Device Security -implementation framework pillar 4 - advanced controls
ISO 27001 Annex A 8.1 User Endpoint Device Security -implementation framework pillar 4 – advanced controls

7. Data Backup Requirements

Backups present their own challenges. As a rule, for ease, you are not going to have a structured approach to the back up of end point devices. That is unless you need one. What you will have to consider though is if people do personal backups then where are those backups and how secure are they. This can be a real rabbit hole to go down. For more detail on backups read ISO 27001 Annex A 8.13 Information Backup.

8. Remove Asset Tags

A traditional way of managing assets is to add physical asset tags to devices that identify the asset. Modern thinking is that these should either be removed or should be replaced with non descriptive, yet unique, tags so as not to make the asset a target as in the case of labelling the asset with the organisation or classification such as confidential as this can lead to the asset becoming a target.

How to Implement ISO 27001 Annex A 8.1

Securing user endpoint devices is a fundamental requirement for maintaining a resilient security perimeter, especially in hybrid and remote working environments. By following these technical implementation steps, your organisation can effectively manage hardware assets and mitigate the risk of data breaches in alignment with ISO 27001 Annex A 8.1.

1. Formalise Endpoint Security Policies and Rules of Engagement

  • Draft a comprehensive “Acceptable Use Policy” (AUP) that explicitly defines user responsibilities for both corporate-owned and BYOD (Bring Your Own Device) assets.
  • Establish a technical “Rules of Engagement” (ROE) document for system administrators that outlines the mandatory security configurations for all devices before they are permitted to access the network.
  • Result: A documented governance framework that ensures all endpoints meet the organisation’s security baseline prior to operation.

2. Provision Unified Endpoint Management (UEM) and MDM Solutions

  • Deploy a centralised Mobile Device Management (MDM) or Unified Endpoint Management (UEM) platform to automate the enrolment and configuration of all laptops, tablets, and smartphones.
  • Enforce “Zero-Touch” provisioning to ensure security profiles, such as Wi-Fi certificates and VPN settings, are pushed to devices automatically.
  • Result: Full technical visibility and administrative control over the entire device estate from a single management console.

3. Mandate Full Disk Encryption (FDE) and Cryptographic Protection

  • Enforce hardware-level encryption (e.g. BitLocker for Windows or FileVault for macOS) across all endpoint devices to protect data at rest.
  • Provision a centralised key management system to securely store and rotate recovery keys, ensuring that encrypted data remains accessible only to authorised personnel.
  • Result: Protection against data exfiltration in the event of physical device theft or loss.

4. Restrict Administrative Access via IAM and MFA

  • Revoke local administrative privileges for standard users to prevent the unauthorised installation of software or modification of system security settings.
  • Implement Multi-Factor Authentication (MFA) and granular Identity and Access Management (IAM) roles for all device-level administrative tasks.
  • Result: A significantly reduced attack surface where malware or malicious actors cannot easily gain persistence on the host.

5. Execute Continuous Compliance Monitoring and EDR Deployment

  • Provision Endpoint Detection and Response (EDR) agents to monitor for anomalous behaviour, such as lateral movement or unauthorised registry changes.
  • Configure “Conditional Access” policies that automatically block devices from accessing corporate resources if they fail security health checks (e.g. outdated OS, disabled firewall).
  • Result: Real-time detection of threats and automated enforcement of the organisation’s security posture.

6. Revoke Access and Perform Secure Remote Wiping

  • Establish technical procedures for the immediate revocation of access and the execution of a “Remote Wipe” command upon notification of device loss or employee termination.
  • Maintain a verifiable audit trail of all decommissioned assets to ensure that corporate data has been forensically removed before hardware disposal.
  • Result: Elimination of residual data risks and the maintenance of a clean, authorised device inventory.

Device Compliance Matrix

Example device compliance matrix for BYOD and handling personal devices.

RequirementCorporate Device (Managed)Personal Device (BYOD)
Enforced PolicyFull Control (MDM Agent)Light Control (App Container)
Data WipeFull Remote WipeCompany Data Only (Selective Wipe)
EncryptionMandatory (BitLocker/FileVault)Required (Check Compliance)
App InstallRestricted (Company Portal)Open (User Choice)

How to pass an ISO 27001 Annex A 8.1 audit

Based on my experience this is the best practice approach to passing the audit of ISO 27001 Annex A 8.1 User Endpoint Devices.

Time needed: 1 day

How to pass an audit of ISO 27001 Annex A 8.1

  1. Have policies and procedures in place

    Write, approve, implement and communicate the documentation required for user end point devices.

  2. Assess your equipment and perform a risk assessment

    Have an asset management process that includes an asset register. For each asset type perform a risk assessment. Based on the risk assessment implement the appropriate controls to mitigate the risk.

  3. Keep records

    For audit purposes you will keep records. Examples of the records to keep include changes, updates, monitoring, review and audits.

  4. Test the controls that you have to make sure they are working

    Perform internal audits that include the testing of the controls to ensure that they are working.

ISO 27001 Annex A 8.1 User Endpoint Device Security - passing the audit
ISO 27001 Annex A 8.1 User Endpoint Device Security – passing the audit

What auditors look for

The auditor is going to check a number of areas for ISO 27001 Annex A 8.1 User Endpoint Devices. Lets go through the main ones:

ISO 27001 Annex A 8.1 User Endpoint Device Security - the auditors checklist
ISO 27001 Annex A 8.1 User Endpoint Device Security – the auditors checklist

1. That you have an asset register

The auditor will check that you have an asset register and an asset management process. They will want to see all of the end point devices in an asset register and that they are assigned to people. For this they are also wanting to see bring your own devices (BYOD) or people’s own devices that connect to or interact with the in scope services.

2. That devices are protected and checked

The auditor is going to check that all the appropriate controls are on the end point device with the usual ones being antivirus and encryption. The SOA and the in scope controls is the starting point and specifically the technical controls that you have said are in scope. They want to see that these are checked periodically with evidence of the checks and they also want to see what you do if the checks fail, with evidence of an example of that. This is covered in more depth in ISO 27001 Annex A Control 5.9 Inventory of information and other associated assets.

A great one here is that they will also check that you check that devices used by auditors and testers as part of verification activities are secure to your standards before allowing them to connect. This is covered in more detail in ISO 27001 Annex A 8.34 Protection of information systems during audit testing

3. Anyone they audit

They will likely check anyone that they audit. The usual operating approach is to get the person to share their screen and then to direct them to show the technical controls in place. This is usually ‘show me the antivirus is working’ as an approach. It is less common for them to observe the desk top and the trash for evidence of things that should not be there. You really should get everyone that is being audited to perform house keeping before the audit with the assumption they will be asked to share their screen. You can refuse and base that on confidentiality but they will want to see a sample of devices so if not you, then it will be someone.

4. Key Documentation Required for a Successful Audit

The auditor will want to see what controls you have in place and evidence of the operation of those controls including records such as change management, access management and that testing and internal audit has happened.

ISO 27001 Annex A 8.1 User Endpoint Device Security - what the auditor will check
ISO 27001 Annex A 8.1 User Endpoint Device Security – what the auditor will check

Top 3 ISO 27001 Annex A 8.1 mistakes and how to avoid them

In my experience, the top 3 mistakes people make for ISO 27001 Annex A 8.1 are

1. Letting people use their own devices

This is not a bad thing actually. Although it comes with some challenges and costs that are going to be far in excess of the cost of just providing a device owned and managed by the organisation. Be sure the appropriate controls are in place and that you can evidence them working.

2. Not encrypting devices

There is no real reason in this day and age to not have encryption. It is built into most operating systems and devices and if not can be easily applied. Having and not having it turned on is worse that not just having it. If you don’t or can’t have it then manage it via risk management and have it on the risk register but where you can deploy it, do, and check it is in place.

3. Your document and version control is wrong

Keeping your document version control up to date, making sure that version numbers match where used, having a review evidenced in the last 12 months, having documents that have no comments in are all good practices.

ISO 27001 Annex A 8.1 User Endpoint Device Security - mistakes and how to avoid them
ISO 27001 Annex A 8.1 User Endpoint Device Security – mistakes and how to avoid them


Applicability of ISO 27001 Annex A 8.1 across different business models.

Business Type Applicability Examples of Control Implementation
Small Businesses Focuses on securing a small fleet of laptops and smartphones, often with a mix of company-owned and personal devices (BYOD). The goal is to enforce the “Security Trifecta” (Encryption, Antivirus, Patching) with minimal administrative overhead.
  • Enabling BitLocker or FileVault on all staff laptops to ensure data is unreadable if a device is stolen.
  • Setting a policy requiring a minimum 6-digit PIN and auto-lock after 2 minutes for all phones used to access work email.
  • Conducting a semi-annual asset inventory to confirm which staff members have which company-issued hardware.
Tech Startups Critical for managing a distributed or remote workforce. Compliance requires automated endpoint management (MDM) to enforce security baselines and the ability to remotely wipe devices when employees leave.
  • Using Microsoft Intune or Jamf to push mandatory security updates and block “Non-Compliant” devices from accessing the network.
  • Implementing “Selective Wipe” capabilities for personal devices so that company data can be removed without affecting personal photos.
  • Mandating the use of privacy screens for developers working in co-working spaces or public cafes to prevent “shoulder surfing.”
AI Companies Vital for protecting specialized hardware and high-value research tools. Focus is on securing endpoints that access high-performance compute clusters and ensuring that data doesn’t “leak” onto local drives.
  • Enforcing strict Data Loss Prevention (DLP) rules to prevent the download of proprietary model weights to local endpoint storage.
  • Using “Virtual Desktop Infrastructure” (VDI) so that research data stays within the secure cloud environment and is never processed locally on the laptop.
  • Restricting the use of external peripherals (like unencrypted USB drives) via endpoint management agents to prevent malicious data extraction.

Fast Track ISO 27001 Annex A 8.1 Compliance with the ISO 27001 Toolkit

For ISO 27001 Annex A 8.1 (User endpoint devices), the requirement is to protect information stored on or accessible via endpoints like laptops, smartphones, and tablets. This involves technical controls (encryption, antivirus), administrative controls (BYOD policies), and human factors (training).

Compliance Factor SaaS Compliance Platforms High Table ISO 27001 Toolkit Audit Evidence Example
Policy Ownership Rents access to your standards; if you cancel, your documented BYOD and encryption rules are lost. Permanent Assets: Fully editable Word/Excel Endpoint Policies that you own forever. A localized BYOD Policy defining remote-wipe consent and security requirements for staff.
Technical Implementation Attempts to “monitor” devices via dashboards that often duplicate native data from Intune, Jamf, or BitLocker. Governance-First: Formalizes your existing tech stack (MDM, EDR) into an auditor-ready framework. A Device Compliance Matrix proving that all mobile assets are encrypted and password-protected.
Cost Structure Charges a “Success Tax” based on the number of endpoints or seats, scaling OpEx as your team grows. One-Off Fee: A single payment covers your governance documentation for 10 devices or 1,000. Allocating budget to actual EDR software or hardware refreshes rather than a monthly paperwork fee.
Stack Freedom Limited by vendor “connectors”; switching MDM providers requires reconfiguring the compliance tool. 100% Agnostic: Standards adapt to any OS (Windows, macOS, iOS, Android) and any security toolset. The ability to switch from one MDM provider to another without needing to pay for new compliance modules.

Own Your ISMS, Don’t Rent It

Do it Yourself ISO 27001 with the Ultimate ISO 27001 Toolkit

Do it Yourself ISO 27001 with the Ultimate ISO 27001 Toolkit


Summary: For Annex A 8.1, the auditor wants to see that you have a formal policy for endpoint security and proof that you follow it (e.g., encryption status checks). The High Table ISO 27001 Toolkit provides the governance framework to satisfy this requirement immediately. It is the most direct, cost-effective way to achieve compliance using permanent documentation that you own and control.

ISO 27001 Annex A 8.1 FAQ

What is ISO 27001 Annex A 8.1?

ISO 27001 Annex A 8.1 is a preventive information security control designed to protect data stored on or accessed by user endpoint devices. It requires organizations to establish policies and technical measures to secure devices against unauthorized access, loss, or theft. Key requirements include:

  • Maintaining an accurate inventory of all devices.
  • Enforcing technical controls like encryption and antivirus.
  • Defining user responsibilities for physical security.

What devices are defined as “User Endpoints” in ISO 27001?

User endpoint devices are any pieces of equipment used by employees or third parties to process, store, or access organizational information. This definition is broad and includes:

  • Corporate and personal laptops or desktops.
  • Smartphones and tablets.
  • Wearable technology (smartwatches).
  • IoT devices or POS terminals connected to the network.

Does ISO 27001 Annex A 8.1 require antivirus and encryption?

Yes, auditors typically view the “Security Trifecta” of encryption, antivirus, and patching as a mandatory baseline for compliance. Without these technical controls, it is difficult to prove you are adequately mitigating risk. Essential implementations include:

  • Full Disk Encryption: Tools like BitLocker or FileVault.
  • Endpoint Protection: Active anti-malware or EDR solutions.
  • Managed Patching: Automated updates for OS and applications.

How do we handle BYOD (Bring Your Own Device) under Annex A 8.1?

Annex A 8.1 allows for BYOD but requires specific governance and technical partitioning to ensure corporate data remains secure on personal devices. Simply allowing personal devices without controls is a major non-conformity. Best practices include:

  • Containerization: Using “Work Profiles” to separate business data from personal apps.
  • Selective Wipe: The ability to remove only corporate data if an employee leaves.
  • Policy Acceptance: Users must sign a BYOD policy acknowledging security rules.

What will an auditor check for Annex A 8.1 compliance?

Auditors generally perform “live verification” spot checks rather than solely relying on written policies. You should be prepared to demonstrate real-time evidence during the audit. Common checks include:

  • Screen Sharing: Asking a random employee to show their antivirus status or disk encryption.
  • MDM Dashboard: Reviewing compliance reports in tools like Intune or Jamf.
  • Leaver Process: Proving a specific device was wiped or returned when a staff member left.

What is the difference between the 2013 and 2022 versions of this control?

The 2022 version (Annex A 8.1) consolidates the previous “Mobile Device Policy” (A.6.2.1) and other controls into a broader, device-agnostic mandate. The primary shifts include:

  • Scope Expansion: Now covers all endpoints, not just mobile devices.
  • User Responsibility: Stronger emphasis on user behavior and physical security.
  • Modern Risks: Explicit consideration for unmanaged environments (e.g., remote work).

ISO 27001 Annex A 5.9 Inventory of information and other associated assets 

ISO 27001 Annex A 5.17 Authentication Information

ISO 27001 Annex A 8.7 Protection Against Malware

ISO 27001 Annex A 8.13 Information Backup

ISO 27001 Access Control Policy Beginner’s Guide

ISO 27001 Asset Management Policy Beginner’s Guide

ISO 27001 Backup Policy Template

ISO 27001 Backup Policy Beginner’s Guide

ISO 27001 Annex A 8.1 User Endpoint Device Security - related ISO 27001 controls
ISO 27001 Annex A 8.1 User Endpoint Device Security – related ISO 27001 controls
Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor ⚡ 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top