NIS2 and SaaS: EU Compliance Guide for IT Leaders
NIS2 is the biggest EU cybersecurity regulation since GDPR — with major implications for SaaS. Learn what IT leaders need to know about compliance.
Personal devices access the same SaaS apps as corporate ones — with fewer controls. Learn how to write a BYOD policy that protects SaaS data.
Bring your own device (BYOD) isn't a policy decision anymore — it's a reality. Employees access SaaS applications from personal laptops, phones, and tablets whether you have a BYOD policy or not. Every browser-based SaaS application works just as well on a personal device as a corporate one.
The question isn't whether to allow BYOD. It's how to secure SaaS data on devices you don't own, don't manage, and can't fully control.
For SaaS-first organizations, the BYOD challenge is different from the traditional endpoint management problem. When applications run in the cloud and data lives in SaaS, the device is an access point — not the data store. This changes the security model from "control the device" to "control the access."
In a traditional IT environment, BYOD risks were limited by what could be installed on a personal device. Corporate applications required VPN access, specific software, or network connectivity.
SaaS eliminates all of these barriers. An employee can:
If the employee has credentials (or a saved browser session), any device in the world can access corporate SaaS data.
Shadow IT and BYOD compound each other. Employees who sign up for unauthorized SaaS tools often do so from personal devices — creating accounts that IT doesn't know about, on devices IT doesn't manage, accessing data IT can't monitor.
The combination of unmanaged devices + unmanaged applications = maximum blind spot.
In hybrid workplaces, the line between corporate and personal device use blurs. An employee might use their corporate laptop at home, switch to a personal tablet on the couch, and check messages on a personal phone during the commute — all accessing the same SaaS applications with the same credentials.
Define which employees can use personal devices and for what purposes:
Eligible devices: Personal laptops, smartphones, and tablets used to access company SaaS applications.
Scope: This policy covers access to company data through SaaS applications from personal devices. It does not grant the company ownership or full management rights over personal devices.
Enrollment: Employees choosing to use personal devices for work must acknowledge this policy and complete the registration process with IT.
Set baseline security standards without requiring full device management:
Personal devices used to access company SaaS applications must meet these minimum requirements:
- Operating system: Current or previous major version (e.g., iOS 17+, Android 14+, macOS 14+, Windows 11)
- Screen lock: PIN, password, fingerprint, or face recognition enabled
- Encryption: Full-disk encryption enabled (default on modern iOS and Android; enable FileVault on macOS, BitLocker on Windows)
- Updates: Automatic OS and browser updates enabled
- Malware protection: Active antivirus/anti-malware on Windows devices
This is where BYOD policy meets SaaS security — controlling access at the application layer rather than the device layer:
Authentication requirements:
- All SaaS access from personal devices must go through SSO with MFA
- Biometric MFA (fingerprint, face recognition) is preferred on mobile devices
- Session timeouts of [4-8 hours] apply to all SaaS applications
- Remember-me / persistent login is prohibited for applications handling confidential data
- Personal devices must re-authenticate after [24 hours] of inactivity
Application-level restrictions:
Access to SaaS applications from personal devices may be restricted based on data classification:
Data Classification Personal Device Access Restricted Blocked — corporate device required Confidential Read-only access; no download or export Internal Full access with MFA Public Full access
Conditional access:
If your identity provider supports conditional access policies, implement:
On personal devices:
- Do not download company data to personal device local storage
- Do not take screenshots of confidential or restricted data
- Do not use personal cloud storage (iCloud, personal Google Drive, Dropbox) for company files
- Use approved file sharing methods only
- Do not print confidential documents from personal devices
For SaaS applications:
- Access company data only through approved applications
- Do not copy company data between approved and unapproved applications
- Do not forward company emails to personal accounts
- Do not use personal email to sign up for business SaaS tools
Employee obligations:
- Report a lost or stolen device to IT security within 2 hours
- Change passwords for all SaaS applications immediately from another device
- Enable remote locate/lock/wipe if available on the device
IT response:
- Terminate all active SaaS sessions for the affected user
- Force password reset across all applications
- Revoke OAuth tokens and API keys
- Monitor for suspicious access from the device
- Assess whether data exposure notification is required
BYOD policies must balance security with employee privacy:
What the company will NOT do:
- Access personal files, photos, messages, or applications on your device
- Track your device location outside of a reported theft/loss scenario
- Monitor personal web browsing or application usage
- Install full device management software without your consent
What the company MAY do:
- Require MFA and SSO for SaaS access
- Enforce conditional access policies at the application level
- Monitor access logs within company SaaS applications (who accessed what, when)
- Revoke SaaS access from your device if a security risk is identified
- Require password changes in response to security incidents
When your employment ends:
- Remove all company SaaS application accounts from your personal device
- Delete any company data stored locally on your device
- IT will revoke SaaS access through your identity provider
- You retain full ownership and control of your personal device
For IT: Follow the SaaS offboarding checklist and terminate all active sessions from the departing employee's devices.
Since you can't fully control the device, control access through identity:
Configure SaaS applications to restrict risky actions from personal devices:
Monitor SaaS access patterns to detect anomalies:
Personal devices are the primary vector for shadow IT adoption. Layer SaaS discovery to catch unauthorized applications accessed from any device:
BYOD is the default state for SaaS access, whether you have a policy or not. Employees will access cloud applications from personal devices. The choice is between managed BYOD with clear policies and security controls, or unmanaged BYOD with zero visibility.
A modern BYOD policy for SaaS-first organizations shifts the security focus from controlling devices to controlling access. Enforce identity-based security through SSO and MFA. Apply data classification to determine which applications allow personal device access. Monitor for anomalies. And keep the policy pragmatic — a policy employees can follow is infinitely more effective than a restrictive policy they bypass.
Want to see which devices are accessing your SaaS applications? Book a demo and get visibility into your access landscape in 15 minutes.
NIS2 is the biggest EU cybersecurity regulation since GDPR — with major implications for SaaS. Learn what IT leaders need to know about compliance.
Learn proven SaaS data protection strategies, from classification to DLP, that keep your cloud data secure and compliant with regulations.
Learn how to identify, assess, and mitigate SaaS risks with proven frameworks. Essential guide for CISOs managing cloud security and vendor risk.