Docy Child

PS-5 – Remote Working Security

Estimated reading: 1 minute 179 views

What is this control really about?

This control is about putting in place processes for ensuring that your employees working from home are being secure when accessing your organization data.  With the rise of working from home, cybersecurity attacks have increased. This is normal because employees don’t all have the same security safeguards as provided in the office, therefore it is important to provide guidance and necessary support to help employees secure their network when accessing organization’s data.

Available tools in the marketplace

Tools
  • No tools recommendation for this section

Available templates

TrustCloud has a curated list of templates internally or externally sourced to help you get started. Click on the link for a downloadable version:

  • Externally outsourced available template from SHRM

What is required to implement this control?

It is important to define and provide documented best-practices to your employees for working from home. Best practices examples include:

  • Public use of wi-fi
  • Remote access via VPN
  • Keeping data on work computers only
  • Physical security while working remotely

What evidence is the auditor looking for?

  • A documented telecommuting policy

An example of what an artifact can look like

1- Documented telecommuting policy

PS 4 2

 

 

Join the conversation

ON THIS PAGE
SUBSCRIBE
FlightSchool
SHARE THIS ARTICLE
Twitter Facebook LinkedIn

❤️  Joyfully crafted by a 100% distributed team.