ISO 27001:2022

ISO 27001 Organisation Controls

ISO 27001 Annex A 5.1: Policies for information security

ISO 27001 Annex A 5.2: Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3: Segregation of duties

ISO 27001 Annex A 5.4: Management responsibilities

ISO 27001 Annex A 5.5: Contact with authorities

ISO 27001 Annex A 5.6: Contact with special interest groups

ISO 27001 Annex A 5.7: Threat intelligence

ISO 27001 Annex A 5.8: Information security in project management

ISO 27001 Annex A 5.9: Inventory of information and other associated assets

ISO 27001 Annex A 5.10: Acceptable use of information and other associated assets

ISO 27001 Annex A 5.11: Return of assets

ISO 27001 Annex A 5.12: Classification of information

ISO 27001 Annex A 5.13: Labelling of information

ISO 27001 Annex A 5.14: Information transfer

ISO 27001 Annex A 5.15: Access control

ISO 27001 Annex A 5.16: Identity management

ISO 27001 Annex A 5.17: Authentication information

ISO 27001 Annex A 5.18: Access rights

ISO 27001 Annex A 5.19: Information security in supplier relationships

ISO 27001 Annex A 5.20: Addressing information security within supplier agreements

ISO 27001 Annex A 5.21: Managing information security in the ICT supply chain

ISO 27001 Annex A 5.22: Monitoring, review and change management of supplier services

ISO 27001 Annex A 5.23: Information security for use of cloud services

ISO 27001 Annex A 5.24: Information security incident management planning and preparation

ISO 27001 Annex A 5.25: Assessment and decision on information security events

ISO 27001 Annex A 5.26: Response to information security incidents

ISO 27001 Annex A 5.27: Learning from information security incidents

ISO 27001 Annex A 5.28: Collection of evidence

ISO 27001 Annex A 5.29: Information security during disruption

ISO 27001 Annex A 5.30: ICT readiness for business continuity

ISO 27001 Annex A 5.31: Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32: Intellectual property rights

ISO 27001 Annex A 5.33: Protection of records

ISO 27001 Annex A 5.34: Privacy and protection of PII

ISO 27001 Annex A 5.35: Independent review of information security

ISO 27001 Annex A 5.36: Compliance with policies and standards for information security

ISO 27001 Annex A 5.37: Documented operating procedures

ISO 27001 Technical Controls

ISO 27001 Annex A 8.1: User Endpoint Devices

ISO 27001 Annex A 8.2: Privileged Access Rights

ISO 27001 Annex A 8.3: Information Access Restriction

ISO 27001 Annex A 8.4: Access To Source Code

ISO 27001 Annex A 8.5: Secure Authentication

ISO 27001 Annex A 8.6: Capacity Management

ISO 27001 Annex A 8.7: Protection Against Malware

ISO 27001 Annex A 8.8: Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9: Configuration Management 

ISO 27001 Annex A 8.10: Information Deletion

ISO 27001 Annex A 8.11: Data Masking

ISO 27001 Annex A 8.12: Data Leakage Prevention

ISO 27001 Annex A 8.13: Information Backup

ISO 27001 Annex A 8.14: Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15: Logging

ISO 27001 Annex A 8.16: Monitoring Activities

ISO 27001 Annex A 8.17: Clock Synchronisation

ISO 27001 Annex A 8.18: Use of Privileged Utility Programs

ISO 27001 Annex A 8.19: Installation of Software on Operational Systems

ISO 27001 Annex A 8.20: Network Security

ISO 27001 Annex A 8.21: Security of Network Services

ISO 27001 Annex A 8.22: Segregation of Networks

ISO 27001 Annex A 8.23: Web Filtering

ISO 27001 Annex A 8.24: Use of Cryptography

ISO 27001 Annex A 8.25: Secure Development Life Cycle

ISO 27001 Annex A 8.26: Application Security Requirements

ISO 27001 Annex A 8.27: Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.28: Secure Coding

ISO 27001 Annex A 8.29: Security Testing in Development and Acceptance

ISO 27001 Annex A 8.30: Outsourced Development

ISO 27001 Annex A 8.31: Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32: Change Management

ISO 27001 Annex A 8.33: Test Information

ISO 27001 Annex A 8.34: Protection of information systems during audit testing

Home / ISO 27001 Annex A Controls / The Ultimate Guide to ISO 27001:2022 Annex A 6.7: Remote Working

The Ultimate Guide to ISO 27001:2022 Annex A 6.7: Remote Working

Last updated Sep 19, 2025

Author: Stuart Barker | ISO 27001 Expert and Thought Leader

Remote working is a work arrangement where employees perform their duties from a location other than a traditional office. This could be their home, a coffee shop, a co-working space, or any other location with a suitable internet connection. In ISO 27001 this is known as ISO27001:2022 Annex A 6.7 Remote Working. It is one of the 93 ISO 27001 Annex A controls

The requirement is for security measures to be implemented when personnel are working remotely to protect information when it is outside the organisation’s premises.

Key Takeaways

  • If you work fully remotely then many of the ISO 27001 physical security controls do not apply to you
  • Remote working security can be addressed with technical controls
  • People need to be educated on working remotely

Benefits of implementing Remote Working

The main benefit is that it allows you to mitigate the risk of remote working. Remote working poses unique challenges as you do not control the physical environment so the risks need to be assessed and appropriate controls implemented. The benefits of implementing ISO 27001 Remote Working include:

  • Reduced risk of data breach due to remote working
  • Improved compliance and meet the needs of laws and regulations that require remote working controls to be place
  • Protection of confidential information
  • Building trust with employees and third parties
  • Reputation Protection because in the event of a breach having effective remote working controls in place will reduce the potential for fines and reduce the PR impact of an event.
ISO 27001 Toolkit

Watch the tutorial

In the video ISO 27001 Remote Working Explained – ISO27001:2022 Annex A 6.7 I show you how to implement it and how to pass the audit.

How to implement ISO 27001 Remote Working

You are going to have to:

  • implement a topic specific policy for remote working
  • ensure that the information security for workers that are operating remotely is in place
  • show that what you implement complies with local laws
  • demonstrate that what you implement complies with local regulations
  • ensure that it meets the needs of the organisation
  • show that it addresses the organisational risks

This is whenever people work from a location outside of your organisations premises. This includes the old fashioned terms of teleworking and telecommuting as well as flexible workplace, fully remote, virtual work environment. They all relate, in essence, to the same thing. You will check local laws and regulations as not all recommendations and guidance can be applied every where. It is after all, general guidance.

ISO 27001 Remote Working Policy

You will need to implement a topic specific policy for remote working. The topic specific ISO 27001 Remote Working Policy Template is ready to go and fast track your implementation jam packed with everything you need.

ISO 27001 Mobile and Remote Working Policy Template

Information security implications of remote working

The security risks associated with remote working include:

  1. Data breaches
  2. Cyberattacks
  3. Fraud
  4. Employee productivity loss
  5. Employee burnout

Mitigating the security risks associated with remote working

Organisations can mitigate the security risks associated with remote working by taking a number of steps, including:

  • Implementing a remote working policy
  • Implementing a remote working procedure
  • Providing secure devices and applications to remote workers
  • Ensuring that remote workers use strong passwords and authentication methods
  • Educating remote workers about information security risks
  • Monitoring and auditing remote working activities

Physical security

There are physical security considerations for remote working that include rules and associated mechanisms: such as lockable storage, filing cabinets, shredders, printers, transportation of physical media, clear desk, and disposal of media.

Consider the person and what they are doing, doing a mini risk assessment to understand the risks they are posed and then work to implement controls to mitigate those risks.

Good examples include remote printing. Not everyone will need to remote print but for those that do you can consider providing a company printer as well as a shredder.

Will the person have access to printed information, or letters and correspondence such as bank statements or contracts. Perhaps they will have to keep physical media. In this scenario we would consider providing lockable storage.

It may be the case, but not always, that people will have a home office. We can think about if having a lock is advisable based on what they do and access.

Be sensible and be practical.

Communication security

Based on the need for remote access to organisation systems and the classification of information to be processed, stored and / or transmitted you will consider the communications security requirements. This will be driven by and in conjunction with your IT and technical teams.

Remote access technology

Consider how the remote access will be implemented such as the use of VPN or virtual desktops. How the protection technology will be implemented such as firewalls and protection against malware. How deploying and initialising, managing and patching of devices will be performed. Technology requirements can be satisfied by engaging with your IT teams.

Unique unauthorised access

Unique to remote working is the threat posed by unauthorised access by friends and family members or from people / persons in public places. There may or may not be measures you need to put in place for this. People consider things like privacy screens or providing guidance on how best to position yourself and work in a public space. Guidance on taking and making calls can be provided that include not having confidential conversations in public places where people can be easily overheard. We have all been on a train when someone reads out their bank details or slags off a colleague on the phone. Don’t be that person.

Training

You will provide training on the ISO 27001 remote working policy and procedures. This will include guidance on how to work securely in a remote environment.

Backup and business continuity

Your backup and business continuity plans and processes will take into account remote working and the associated challenges. Consider things like mobile devices and if you do in fact back them up, or not.

Insurance

Often overlooked, you will ensure that you have appropriate insurance arrangements in place to cover remote working and the risks that it poses.

Audit and security monitoring

As part of your internal audit programme you will be performing remote audits for remote workers to check that they are operating in line with policy and process. This usually involves a remote interview over camera to view the working practices.

How to pass the audit

To comply with ISO 27001 Annex A 6.7 Remote Working you are going to implement the ‘how’ to the ‘what’ the control is expecting. In short measure you are going to:

  • Write, sign off, implement and communicate your topic specific policy on remote working
  • Write, sign off, implement and communicate your remote working procedures
  • Consider the risks of physical security and provide assets that can mitigate the risk such as screen protectors, lockable cupboards, home shredders
  • Implement communications technology that allows people to connect, use and communicate in the work environment
  • Provide on going training and awareness of the risks and mitigations associated with remote working
  • Consider the level to which remote working backup will or will not be implemented
  • Ensure that appropriate insurance is in place
  • Ensure that work environments meet all health and safety laws as well as local laws and regulations
  • Implement a process of internal audit that checks that the appropriate controls are in place and effective and where they are not follow the continual improvement process to address the risks

To pass an audit of ISO 27001 Annex A 6.7 you are going to make sure that you have followed the steps above in how to comply.

What the auditor will check

The audit is going to check a number of areas for compliance with ISO 27001 Annex A 6.7. Lets go through them

1. That you have conducted audits of remote working

Remote working provides a unique challenge as it allows working in uncontrolled environments. As part of your risk assessment you will have selected the controls that you need based on risk. As part of your governance you will audit those controls based on the risk and at least annually to ensure that they are effective and operating as intended. You will keep records or audit as well as audit report and evidence that the audit reports were communicated to the right people. Where controls were seen to be in effective you will have evidence of continual improvement and risk management to show how you manage the nonconformity.

2. That you have appropriate technical controls in place

Due to the risks associated with remote working you will have evidenced that you have considered and chosen appropriate technologies to mitigate the risks. The audit will check the controls, that they appropriate, proportionate and in control. Evidence of reports, monitors and measures will be examined.

3. That people are aware of their responsibilities

The audit is going to check for documented processes, documented topic specific policy and these have been communicated and people have been trained on what is required of them.

Top 3 Mistakes People Make

In my experience, the top 3 mistakes people make for ISO 27001 Annex A 6.7 Remote Working are

1. You have no evidence that anything actually happened

You need to keep records and minutes of everything. You need a paper trail to show it was done. Make sure you have updated communication plans and training plans on remote working. For the controls that you have implemented be able to sure the management monitors, reports and metrics. If it isn’t written down it didn’t happen.

2. One or more members of your team haven’t done what they should have done

Prior to the audit check that all members of the team have done what they should have. Do they know where the process documents are in relation to remote working? Do a pre audit as close to the audit as you can that checks the remote workers that will be involved. Assuming they are doing the right thing is a recipe for disaster. Check!

3. Your document and version control is wrong

Keeping your document version control up to date, making sure that version numbers match where used, having a review evidenced in the last 12 months, having documents that have no comments in are all good practices.

ISO 27001 Certification Strategy Session

ISO 27001 Remote Working FAQ

What is ISO 27001 Annex A 6.7, Remote Working?

ISO 27001 Annex A 6.7, Remote Working, is a control within the ISO 27001 standard that addresses the information security risks associated with employees working outside the organisation’s physical premises. It aims to ensure that the same level of information security is maintained regardless of the working location.

What is the main objective of this control?

The primary objective is to implement appropriate security measures for remote working to protect information and information processing facilities, ensuring the security of the organisation’s assets and compliance with its information security policies.

Does remote working only apply to working from home?

No, remote working encompasses any scenario where an employee or authorised individual accesses organisational information or systems from a location outside the organisation’s controlled premises. This can include working from home, co-working spaces, client sites, hotels, or during travel.

What are some key security considerations for remote working under Annex A 6.7?

Key considerations include:
Secure access to organisational systems and data.
Protection of devices used for remote work (laptops, smartphones, tablets).
Physical security of the remote working environment.
Data transfer and storage security.
Awareness and training for remote workers.
Incident management for remote working scenarios.

What kind of policies should an organization have in place for Annex A 6.7?

Organisations should establish a comprehensive remote working policy that covers aspects such as:
Acceptable use of devices and networks.
Procedures for connecting to the corporate network (e.g., VPN).
Guidelines for physical security of the remote workspace.
Data handling and storage rules.
Reporting security incidents.
Responsibilities of remote workers.

What technological controls are typically associated with Annex A 6.7?

Common technological controls include:
Virtual Private Networks (VPNs) for secure network access.
Multi-Factor Authentication (MFA).
Endpoint security solutions (antivirus, anti-malware).
Data encryption (at rest and in transit).
Secure remote access technologies (e.g., VDI – Virtual Desktop Infrastructure).
Regular patching and updates for remote devices.

What are the human aspects of Annex A 6.7?

The human aspect is critical. It involves:
Educating remote workers on information security risks, policies, and best practices.
Clearly defining the security responsibilities of remote employees.
Providing adequate IT support for remote workers to address security concerns or technical issues.

How does physical security apply to remote working under Annex A 6.7?

While not in a traditional office, remote workers still need to consider physical security. This includes:
Securing devices (e.g., not leaving laptops unattended in public).
Protecting sensitive documents from unauthorised access at home.
Ensuring the remote workspace is private and secure from prying eyes.

What needs to be considered regarding communication for remote workers?

Secure communication channels are vital. This means using encrypted messaging platforms, secure video conferencing tools, and ensuring that sensitive information is not discussed in insecure environments or over unencrypted lines.

How should incident management be adapted for remote working scenarios?

Organisations need clear procedures for remote workers to report security incidents immediately. The incident response plan should account for the geographical dispersion of remote workers and the need for remote forensic capabilities.

Does Annex A 6.7 require specific audits for remote workers?

While not explicitly demanding separate audits, an organisation’s overall internal audit program for ISO 27001 should include an assessment of the effectiveness of controls related to remote working. This might involve reviewing remote access logs, policy compliance, and training records.

How does Annex A 6.7 address the use of personal devices (BYOD)?

If an organisation allows Bring Your Own Device (BYOD) for remote working, Annex A 6.7 mandates specific controls to manage the risks. This includes implementing mobile device management (MDM) solutions, clear policies on data segregation, secure access protocols, and procedures for wiping corporate data from personal devices if an employee leaves or a device is lost.

What are examples of remote working controls?

Controls that can mitigate the risks of remote working include:
1. Screen privacy protectors
2. VPN connection technology
3. End Point Device Management
4. Home Office Shredders
5. Home Office Lockable Storage
6. Two Factor Authentication

Why is ISO 27001 Annex A 6.7 Remote Working Important?

The control is important because more and more people are now working remotely. The old traditions of working from an office are being replaced with more flexible working but with more flexible working come more challenges. This control address those challenges by identifying the risks and working on controls that are appropriate to you to mitigate those risks.

Do I have to satisfy ISO 27001 Annex A 6.7 Remote Working for ISO 27001 Certification?

If you have remote workers then yes. This is required if people work in a physical environment that you do not control.

Who is responsible for implementing remote working?

The organisation is responsible for drafting and implementing remote working. The organisations IT department is typically responsible for the technical implementation, and the organisation’s human resources department is typically responsible for implementing the processes and engaging with employees. Seek legal advice whether that is internal or external resource.

What are the challenges of remote working?

The challenges of using remote working include:
Having operational oversight of employees
Increased security risks due to the uncontrolled environments worked in
Productivity and time management

Are there free templates for ISO 27001 Annex A 6.7 Remote Working?

There are templates that support ISO 27001 Annex A 6.7 included in the ISO 27001 Toolkit

Can I write a topic specific policy for ISO 27001 Remote Working myself?

Yes. You can write the remote working policy for ISO 27001 Annex A 6.7 yourself. You will need a copy of the standard and approximately 1 week of time to do it. It would be advantageous to have a background in information security management systems.

Where can I get templates for ISO 27001 Annex A 6.7?

ISO 27001 templates that support ISO 27001 Annex A 6.7 are part of the ISO 27001 Toolkit

How hard is ISO 27001 Annex A 6.7 Remote Working?

ISO 27001 Annex A 6.7 is not particularly hard. It can take a lot of time if you are doing it yourself but it is not technically very hard. We would recommend ISO 27001 templates to fast track your implementation.

How long will ISO 27001 Annex A 6.7 Remote Working take me?

ISO 27001 Annex A 6.7 will take approximately 1 week to complete if you are starting from nothing and doing it yourself. Or you could download the High Table ISO 27001 Remote Working Policy.

How much will ISO 27001 Annex A 6.7 Remote Working cost me?

The cost of ISO 27001 Annex A 6.7 will depend how you go about it. If you do it yourself it will be free but will take you about 1 week so the cost is lost opportunity cost as you tie up resource doing something that can easily be downloaded. If you download an ISO Policy Template then you are looking at a around £10.

Can an organization outsource remote working security under Annex A 6.7?

An organization can use third-party services (e.g., cloud-based security solutions, managed IT services) to support remote working security. However, the organization remains ultimately responsible for ensuring that the implemented controls meet the requirements of Annex A 6.7 and its overall ISMS. Due diligence and contractual agreements are essential.

ISO 27001 Clause 9.1 Monitoring, Measurement, Analysis, Evaluation

ISO 27001 Clause 9.2 Internal Audit

ISO 27001 Annex A 5.14 Information Transfer

ISO 27001 Annex A 7.3 Securing Offices, Rooms And Facilities

ISO 27001 Annex A 7.7 Clear Desk And Clear Screen

ISO 27001 Annex A 8.1 User Endpoint Devices

ISO 27001 Annex A 8.7 Protection Against Malware

ISO 27001 Annex A 8.12 Data Leakage Prevention

ISO 27001 Annex A 8.15 Logging

ISO 27001 Annex A 8.16 Monitoring Activities

ISO 27001 Annex A 8.20 Network SecurityISO 27001 Annex A 8.20 Network Security

Further Reading

ISO 27001 Mobile and Remote Working Policy Beginner’s Guide

ISO 27001 Clear Desk Policy: How to Write (& Template)

ISO 27001 Logging and Monitoring Policy: How to Write & Template

ISO 27001 Clear Desk Policy: How to Write (& Template)

ISO 27001 Information Transfer Policy: How to Write (& Template)

Working Remotely at OFFICIAL and SECRET (GOV UK)

Ministry of Justice Security Guidance Remote Working

Home working: preparing your organisation and staff (National Cyber Security Centre)

ISO 27001 Annex A 6.7 Attributes Table

Control typeInformation
security properties
Cybersecurity
concepts
Operational
capabilities
Security domains
PreventiveAvailability
Confidentiality
Integrity
ProtectAsset Management
Information protection
Physical security
System and Network security
Protection

About the author

Stuart Barker is an information security practitioner of over 30 years. He holds an MSc in Software and Systems Security and an undergraduate degree in Software Engineering. He is an ISO 27001 expert and thought leader holding both ISO 27001 Lead Implementer and ISO 27001 Lead Auditor qualifications. In 2010 he started his first cyber security consulting business that he sold in 2018. He worked for over a decade for GE, leading a data governance team across Europe and since then has gone on to deliver hundreds of client engagements and audits.

He regularly mentors and trains professionals on information security and runs a successful ISO 27001 YouTube channel where he shows people how they can implement ISO 27001 themselves. He is passionate that knowledge should not be hoarded and brought to market the first of its kind online ISO 27001 store for all the tools and templates people need when they want to do it themselves.

In his personal life he is an active and a hobbyist kickboxer.

His specialisms are ISO 27001 and SOC 2 and his niche is start up and early stage business.