A.6.2 Mobile Devices and Teleworking

A.6.2 Mobile Devices and Teleworking its objective is to ensure the security of teleworking and the use of mobile devices.

A.6.2.1  Mobile Device Policy

 Control- To manage the risks introduced by the use of mobile devices, a policy and supporting safety measures should be adopted.

 Implementation Guidance- Special care should be taken when using mobile devices to ensure that business information is not compromised. The policy on mobile devices should take into account the risks of working with mobile devices in unprotected environments.

Related Product : ISO 27001 Lead Auditor Training And Certification ISMS

Mobile device policy should include:-

  1. Registration of mobile devices;
  2. Requirements for physical protection;
  3. Restriction of software installation;
  4. Requirements for mobile device software versions and for applying patches;
  5. Restriction of connection to information services;
  6. Access controls; Cryptographic techniques;
  7. Malware protection;
  8. Remote disabling,
  9. erasure or lockout;
  10. Backups;
  11. Usage of web services and web apps.

Be careful while using mobile devices in public areas like meeting rooms and other not so protected areas. Preventive measures should be taken to avoid unauthorized access, or disclosure of confidential information stored and processed by the devices, eg. cryptographic methods and enforcing the use of secret authentication information

Mobile devices should also be physically secured against theft, particularly when entering, for example, in vehicles and other modes of transport, hotel rooms, convention centers, and public gatherings. A chosen protocol, taking into account the regulatory, insurance, and other security requirements of the organization, should be defined for cases of theft or loss of mobile devices. Devices containing confidential, sensitive, or crucial business information should not be ignored and, if possible, should be physically locked away, or special locks should be used to protect the items.

Training should be provided for workers using mobile devices to increase their understanding of the potential risks emerging from this method of operating and, thereby, the controls that should be implemented. If the mobile device policy allows the use of private mobile devices, it will also include the rules and associated security controls, those are:-

  1. Separate personal and business usage of the devices, including by using software to help the segregation of personal devices and protect business data;
  2. Providing access to business information only after an end-user agreement has been signed that recognizes their duties (physical safeguard, software upgrade, etc.) waives control of the company’s business data and requires remote data wiping by the client for burglary, loss of a device, or no longer authorized to use a service. The Privacy Legislation must be taken into account in this strategy.

Other Information- Wireless networks for mobile devices are similar to other network connections but have significant variations to be taken into account in the detection of controls. Those significant variations are as follows:-

  1. Certain wireless security protocols are immature and have defined weaknesses;
  2. Mobile device storage may not be backed up due to insufficient network bandwidth and even when backup processing is scheduled, devices may not be connected.

Mobile devices generally share common functions, e.g. networking, internet access, e-mail, and file handling, with fixed-use devices. Controls in information security for mobile devices typically consist of those implemented within fixed use systems and those to counter risks raised by their use outside the premises of the organization.

A.6.2.2  Teleworking

Control- To guard the accessed, processed, or stored information at teleworking sites, a policy and supporting security measures should be implemented.

Implementation Guidance- Teleworking organizations should issue a policy defining the guidelines for using teleworking. The following points should be considered where deemed applicable and authorized by law:-

  1. The existing physical security of the teleworking site, taking into account the physical safety of the building and, consequently, the local environment;
  2. the proposed physical teleworking environment;
  3. Communications security requirements, taking into consideration the need for direct access to the internal networks of the organization, the sensitivity of the information to be obtained and transmitted via the contact channel and, thus, the vulnerability of the internal system;
  4. Providing virtual desktop access which prevents information processing and storing on private equipment;
  5. Risk of unauthorized access to information or resources from other persons using the amenities, e.g. family and friends.
  6. Usage of home networks, and requirements or limitations on wireless network access configuration;
  7. Policies and procedures for settling conflicts involving property rights built on privately-owned equipment;
  8. Access to private facilities (to test the security of the device or during an investigation) which may be prohibited by law;
  9. Software License agreements which are such organizations may be responsible on workstations owned privately by staff and/or external parties for licensing for client software;
  10. Requirements for malware protection and firewall.

Also Read : Annex A.6 Organization of Information Security

The guidelines and arrangements should include the following:-

  • The procurement of suitable teleworking facilities and storage furniture, where the use of private devices not under the organization’s regulation is not permitted;
  • A definition of the work allowed, the hours of work, the classification of the information to be stored and therefore the internal systems and services to which the teleworker is entitled;
  • Provision of an appropriate communication system, including methods for securing remote access;
  • Physical security, provision of insurance policies, a requirement of support and maintenance for hardware and software
  • Rules and guidance on access to equipment and information for families and visitors;
  • Monitoring of audit and security,
  • Backup and business continuity planning
  • Revocation of authority and service privileges and removal of facilities after termination of teleworking operations.

Other Information- Telecommunications applies to all working practices, particularly non-traditional work environments, such as those known as ‘telecom,’ ‘flexible workplace,’ ‘virtual work’ or ‘remote work.’

Communication plays a vital role in personal life as well as in Business operations, standards like ISO 27001 and its sister standard  ISO 27002  which provides the guidelines on usages of mobile devices and teleworking, Infosavvy provides the thorough knowledge about both the standards in IRCA CQI ISO 27001:2013 Lead Auditor (LA) and ISO 27001 Lead Implementer (LI) (training  (certified by TÜV SÜD) and also  incorporate faculties that make learning easy and experiential for the participants so that they can excel in managing ISMS

Questions related to this topic
  1. What are ISO 27001 requirements?
  2. What are the ISO 27001 controls?
  3. What is information processing facilities?
  4. What is physical and environmental security?

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com


Leave a Comment

Your email address will not be published. Required fields are marked *