ISO 27001 A.6.7: Remote working
What This Control Requires
Security measures shall be implemented when personnel are working remotely to protect information accessed, processed or stored outside the organization's premises.
In Plain Language
Remote work is the norm now, but it means your data is being accessed from kitchen tables, coffee shops, airport lounges, and co-working spaces - all outside the controlled environment of your office. The security risks are real and varied: unsecured home networks, shared living spaces where screens can be seen, personal devices, stolen laptops, and reduced visibility of what users are doing.
This control covers all forms of working outside the office - regular home-based work, occasional WFH, working while travelling, client sites, co-working spaces, and using mobile devices to access organisational information from anywhere.
The goal is not to make remote work difficult, but to make it safe. You need security measures that address the specific risks of each scenario while still letting people be productive.
How to Implement
Write a remote working security policy covering who is authorised to work remotely, what information can be accessed, the security requirements for remote environments, and which tools and technologies are approved for remote access.
Get the technical controls right. Require VPN connections for accessing internal networks. Enforce multi-factor authentication on all remote access without exception. Deploy EDR tools on every remote device. Mandate full-disk encryption on laptops and mobile devices. Use MDM for both company-owned and BYOD devices. Put cloud access security controls in place for cloud-based applications.
Set physical security expectations for remote environments. You cannot control someone's home the way you control an office, but you can instruct people to use a private workspace where screens are not visible to others, lock devices when stepping away, keep physical documents secure, use privacy screens in public spaces, avoid sensitive calls in public, and store equipment securely when not in use.
Address network security. Advise staff on securing home Wi-Fi (WPA3, strong passwords, updated firmware). Consider providing mobile hotspots as an alternative to untrusted networks. Be careful with split-tunneling policies and understand the security versus performance trade-offs. Block or restrict access from known-risky network locations.
Put data protection measures in place. Define what can be stored locally versus accessed only through remote sessions. Deploy DLP on remote endpoints. Restrict removable media use. Ensure you can remotely wipe organisational data from personal devices if needed. Provide clear guidance on printing sensitive documents at home, or restrict it entirely.
Sort out equipment and support. Decide whether you provide equipment or allow BYOD, and set minimum security standards for either. Make sure remote workers have clear channels to report security incidents and that IT support is accessible for security issues.
Evidence Your Auditor Will Request
- Remote working security policy with defined rules and requirements
- VPN and remote access configuration showing MFA enforcement
- Endpoint security configuration for remote devices including encryption and EDR
- MDM or endpoint management records showing compliance of remote devices
- Training records showing personnel have been trained on remote working security
Common Mistakes
- No formal remote working security policy despite widespread remote working
- Remote access does not require multi-factor authentication
- Endpoint encryption is not enforced on all remote devices
- No guidance provided to personnel on securing their home working environment
- BYOD devices are used without any management or security controls
Related Controls Across Frameworks
| Framework | Control ID | Relationship |
|---|---|---|
| SOC 2 | CC6.1 | Partial overlap |
| SOC 2 | CC6.6 | Related |
| GDPR | Art.32 | Related |
| NIS2 | Art.21(2)(a) | Partial overlap |
Frequently Asked Questions
Should we provide separate equipment for remote working?
How do we monitor security compliance for remote workers?
Track ISO 27001 compliance in one place
AuditFront helps you manage every ISO 27001 control, collect evidence, and stay audit-ready.
Start Free Assessment