0% found this document useful (0 votes)
2 views

Remote Work Policy

The Remote Work Policy outlines guidelines for employees working remotely, focusing on security measures such as VPNs, Multi-Factor Authentication, and endpoint security. It emphasizes secure access to corporate resources, regular monitoring, and compliance with corporate security policies. The policy also includes provisions for testing the security infrastructure and revoking access credentials when no longer needed.

Uploaded by

aligassarcby2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Remote Work Policy

The Remote Work Policy outlines guidelines for employees working remotely, focusing on security measures such as VPNs, Multi-Factor Authentication, and endpoint security. It emphasizes secure access to corporate resources, regular monitoring, and compliance with corporate security policies. The policy also includes provisions for testing the security infrastructure and revoking access credentials when no longer needed.

Uploaded by

aligassarcby2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Remote Work

Policy

1 of 4
Title

Remote Work Policy


Version Control

Owner Version Edited By Date Comments


Coach Direct 0.1 KL 14/07/16 First Draft

Distribution

Held By Format Location Comments


Digital /
Physical

Status

X Status Approved By Date


Working
X Draft
Provisional
Approval
Publication

Classification

Please refer to ISMS 02 Information Handling & Classification Procedure


X Confidential
Restricted
Unclassified

Relevance to Standard

Standard Control Title

ISO 27002:2022 Organizational Controls Remote Working

2 of 4
Remote Work Policy

1.0 Overview This policy provides a comprehensive set of guidelines


designed to outline the expectations, responsibilities, and security
measures for employees working remotely outside the traditional office
environment.

2.0 Policy
2.1 Implementation

The organization will implement suitable security controls to


ensure secure access to corporate resources for remote
employees. This includes the use of Virtual Private Networks
(VPNs), Multi-Factor Authentication (MFA), and endpoint
security solutions to protect remote connections to the corporate
network.

2.2 Configuration

The organization recognizes that remote access requires secure


authentication and authorization mechanisms.

Access to corporate systems and sensitive data will be granted


based on the Access Control Policy and the principle of least
privilege.

The MANAGING DIRECTOR will provide written authorization,


including via email, for any changes to remote access
configurations based on the recommendations of the approved
IT Support Company.

Access credentials and permissions that are no longer required


will be revoked immediately to mitigate security risks. The IT
Support Company is authorized to remove inactive accounts
without prior approval where they determine a security threat
exists.

All remote access configurations will be reviewed by the IT


Support Company and agreed upon by the MANAGING
DIRECTOR on an annual basis.

3 of 4
2.3 Endpoint Security

All devices used for remote work must comply with corporate security
policies, including:
• Up-to-date antivirus and anti-malware protection.
• Regular security patching and updates.
• Encryption of sensitive data stored on remote devices.

The IT Support Company will ensure that endpoint security compliance is


monitored regularly, with necessary updates applied within 30 days of
release.

2.4 Monitoring

The organization will maintain logs of remote access activity for security
monitoring and audit purposes.
Critical security alerts related to remote access breaches will be reported to
the approved IT Support Company for investigation and mitigation.

2.5 Testing

The security of remote work infrastructure will be tested at least annually,


using tools such as:
• VPN penetration testing tools.
• Endpoint security compliance checks.
• Phishing simulation tests to assess employee awareness.

3.0 Related Policies


• Password Policy
• Access Control Policy
• Data Protection Policy

Prepared By:
Mohammed Khaled
Feras Salah
Abdullah Adel
Mohammed Saleh
Ali AL-ammary

4 of 4

You might also like