Skip to content

BYOD Endpoint Security Policy

Defines the Bring Your Own Device (BYOD) operating model and minimum endpoint security requirements for all devices used to access Meridian Seven systems and data.

All employees, contractors, and third parties who use personal devices (macOS, Windows) to access Meridian Seven systems or data, regardless of location.

Meridian Seven operates a BYOD (Bring Your Own Device) model. Employees use their personal devices for all work activities. Security is enforced through software controls — CrowdStrike Falcon (endpoint detection and response), 1Password (credential management), Google Workspace (identity, MFA, endpoint verification), and disk encryption — rather than hardware ownership.

All devices used for work must meet the minimum requirements in this policy before accessing company systems. Compliance is verified through automated posture checks and continuous monitoring.

RequirementmacOSWindows
OS VersionmacOS 14 (Sonoma) or laterWindows 11 22H2 or later
Disk EncryptionFileVault enabledBitLocker enabled
Screen Lock5-minute maximum inactivity timeout5-minute maximum inactivity timeout
FirewallmacOS Firewall enabledWindows Defender Firewall enabled
EDRCrowdStrike Falcon sensor installed and activeCrowdStrike Falcon sensor installed and active
Password Manager1Password app and CLI installed1Password app and CLI installed
Auto-UpdatesAutomatic OS and security updates enabledAutomatic OS and security updates enabled
MFAConfigured on all company accountsConfigured on all company accounts

New employees must complete device setup within 48 hours of their start date:

  1. Install 1Password using the invitation sent to your Meridian7 email
  2. Install the CrowdStrike Falcon sensor using the enrollment email sent by CrowdStrike
  3. Enable disk encryption (FileVault on macOS, BitLocker on Windows)
  4. Confirm firewall is enabled and screen lock is set to 5 minutes or less
  • Internal data: Access via browser and approved applications only
  • Confidential data: Access via approved applications; local caching permitted only within approved apps (e.g., 1Password, Google Drive desktop client). Do not export to personal storage or unapproved locations.
  • Restricted data: Access only via Doppler or 1Password. Never stored locally outside these tools.
  • Removable media: Prohibited for all company data per the Data Classification Policy

When an employee departs Meridian Seven:

  1. CrowdStrike Falcon sensor removed from device (or remote uninstall initiated via Falcon Console)
  2. Employee signs out of all company accounts (Google Workspace, Slack, GitHub, 1Password, etc.)
  3. Employee removes all company data from local storage
  4. Device removed from CrowdStrike host inventory
  5. Google Workspace account suspended (triggers deactivation of SSO-linked services)

See the Offboarding Checklist for the complete process.

Devices that do not meet minimum requirements will have access to company systems suspended until the device is brought into compliance. The CTO or CISO may grant a time-limited exception with documented justification.

ControlDescription
CC6.4Asset protection — endpoint security requirements
CC6.5Restrict data movement — device-level controls
CC6.6Boundary protection — firewall and encryption requirements
CC6.7Data transmission — encryption in transit and removable media prohibition
CC7.2Anomaly detection — CrowdStrike EDR on all devices

Meridian Seven — Confidential