Kishore Kumar
April 23, 2019
Update 2022-03-11.
In this era of data-driven IT, managing and securing your data / information has become the most integral part of running your business. In the article below, we will take you through the best practices to consider for an ISO 27001-compliant remote access policy and effective implementation of information security controls.
A remote access policy is a document designed to protect the company’s network from external access. This is a written file with guidelines for connecting to the company’s network from outside the office.
It helps organizations secure corporate data and supervise users logging in from unsecured locations such as their home networks.
Teleworking, working while on a business trip or from your home, is becoming popular and vastly accepted by international companies due to many cost-saving factors and flexibility. Having access to your IT Infrastructure via various methods of remote access is as good as people sitting physically in your connected network and accessing your IT Infrastructure.
A study by one Switzerland-based service office provider says that 70% of people globally work remotely at least once a week, and so telecommuting is more popular than ever.
By implementing a teleworking control policy and supporting relevant security measures, the information accessed, processed, or stored at teleworking sites can be secured and protected.
To learn more about the information security controls in teleworking, read this article: How to apply information security controls in teleworking according to ISO 27001.
Any entity or organization that allows teleworking must have a policy, an operational plan, and a procedure stating that the conditions and restrictions are in line with the applicable and allowed law. Here’s what should be taken into account for your ISO 27001 remote access policy:
Remote access to your corporate IT infrastructure network is essential to the functioning of your business and the productivity of the working unit. There are external risks that must be mitigated to the best of your ability by designing a secure access policy and implementing ISO compliance controls. The purpose of the ISO 27001 remote access policy is to define and state the rules and requirements for accessing the company’s network. Rules must be defined to eliminate potential exposure due to unauthorized use, which could cause a loss of the company’s sensitive data and intellectual property, a dent in its public image, and the compromise of resources. Here are the guidelines for defining the rules to eliminate potential exposure due to unauthorized use:
To learn more about handling access control, read this article: How to handle access control according to ISO 27001.
In order to access your company’s private, internal network remotely from your host, you can use Virtual Private Network (VPN) connections. VPNs securely tunnel the data transmitted between the remote user and the company network, to ensure that the data and files you are sending are not accessible other than by the two parties.
Though VPNs are designed to securely access your organization’s network using encryption, other authentication measures and best practices must be followed to secure your data transmission in a better sense. Enhanced security, site-to-site tunneling, session restrictions, and multiple factor authentications are some of the advantages with VPN.
Giving your employees the possibility to work from anywhere has myriad advantages, but measures of wariness need to be taken. This is why remote access to the organization’s network needs to be interpreted as a risk, and hence there is a need to have appropriate controls for it. Therefore, it should be allowed only in the cases where required and with adequate security controls required by ISO 27001.
To learn how to write teleworking and other security policies, see this free online training: ISO 27001:2013 Foundations Course.