How to Audit ISO 27001 Annex A 7.13 Security of Assets Off-premises: An ISO 27001 Lead Auditor’s Guide

Auditing ISO 27001 Annex A 7.13 Security of Assets Off-premises is the critical evaluation of technical controls protecting devices outside secure perimeters. The Primary Implementation Requirement involves enforcing full-disk encryption and remote wiping, providing the Business Benefit of mitigating data leakage risks from stolen or lost physical assets.

ISO 27001 Annex A 7.13 Security of Assets Off-premises Audit Checklist

This technical verification tool is designed for lead auditors to establish the continuous protection of organisational assets when used outside the primary security perimeter. Use this checklist to validate compliance with ISO 27001 Annex A 7.13.

1. Off-premises Asset Authorisation Records Verified

Verification Criteria: Every instance of an information processing asset being removed from the organisation’s premises is supported by a documented authorisation from an appropriate level of management.

Required Evidence: Approved Asset Removal Requests or digital authorisation logs within the ITSM or HR system.

Pass/Fail Test: If a physical asset is missing from the office but has no corresponding recorded management approval for its removal, mark as Non-compliant.

2. Off-premises Asset Security Policy Formalised

Verification Criteria: A documented policy exists that explicitly defines the security standards, handling requirements, and personal responsibilities for assets used in remote or public environments.

Required Evidence: Approved “Mobile Working Policy” or “Off-premises Asset Policy” with evidence of recent management review.

Pass/Fail Test: If the organisation lacks a formalised set of rules for protecting assets outside the office (e.g., in transit or home offices), mark as Non-compliant.

3. Full Disk Encryption (FDE) Enforcement Validated

Verification Criteria: Technical controls are active on all portable devices to ensure that data remains inaccessible in the event of theft or loss during off-premises use.

Required Evidence: MDM (Mobile Device Management) or Endpoint Management reports showing “Encrypted” status for 100% of sampled remote endpoints.

Pass/Fail Test: If a sampled off-premises laptop is found to have BitLocker, FileVault, or equivalent encryption disabled or not managed centrally, mark as Non-compliant.

4. Physical Protection Training and Awareness Verified

Verification Criteria: Personnel are formally required to maintain physical custody of assets in transit and avoid leaving them unattended in public places or unmonitored vehicles.

Required Evidence: Signed “Asset Acceptance Forms” containing transit security clauses and training logs covering physical theft prevention.

Pass/Fail Test: If the organisation cannot prove that users were briefed on the specific risks of leaving hardware in vehicles or public spaces, mark as Non-compliant.

5. Remote Wipe and Tracking Capabilities Confirmed

Verification Criteria: The organisation possesses the technical capability to remotely lock, locate, or wipe off-premises assets that are reported as lost or stolen.

Required Evidence: MDM dashboard screenshots demonstrating remote command functionality and logs of any historical wipe executions.

Pass/Fail Test: If the organisation cannot technically execute a remote wipe command on a sampled mobile asset, mark as Non-compliant.

6. Secure Connection (VPN) Mandate Validated

Verification Criteria: Technical configurations ensure that off-premises assets must utilise a secure encrypted tunnel to access internal organisational resources.

Required Evidence: VPN configuration profiles on endpoints or firewall logs showing remote access limited to authorised encrypted tunnels.

Pass/Fail Test: If a remote asset can access internal file shares or sensitive SaaS applications over public internet without an active VPN or ZTNA tunnel, mark as Non-compliant.

7. Off-premises Asset Maintenance and Patching Verified

Verification Criteria: Assets used primarily off-premises receive regular security patches and antivirus updates despite their physical location.

Required Evidence: Patch management dashboard showing “Compliant” status for devices that have not connected to the local office network for >30 days.

Pass/Fail Test: If off-premises assets show a significant lag in critical security updates compared to on-premises assets, mark as Non-compliant.

8. Public Display Privacy Controls Confirmed

Verification Criteria: Procedures or technical tools are utilised to prevent the unauthorised viewing of sensitive data on screens in public spaces (“shoulder surfing”).

Required Evidence: Physical sighting of privacy filters on sampled remote hardware or documented guidance on visual privacy in the remote work policy.

Pass/Fail Test: If staff handling high-sensitivity data are found working in public areas without privacy filters or explicit visual security guidance, mark as Non-compliant.

9. Off-premises Asset Inventory Reconciliation Verified

Verification Criteria: The organisation performs periodic audits to confirm the location, status, and integrity of all assets assigned for off-premises use.

Required Evidence: Annual asset reconciliation report or timestamped “Last Seen” reports for the entire mobile asset inventory.

Pass/Fail Test: If the organisation cannot verify the “Last Seen” status or physical existence of a sampled off-premises asset within the previous 90 days, mark as Non-compliant.

10. Return of Assets Procedure Integrity Validated

Verification Criteria: A formalised process ensures that all off-premises assets are returned, inspected, and securely wiped upon termination of employment or role change.

Required Evidence: Signed Off-boarding Checklists and technical logs confirming data sanitisation before asset reissue.

Pass/Fail Test: If an asset returned from off-premises use is reissued to a different user without a recorded data wipe/sanitisation step, mark as Non-compliant.

Control RequirementThe ‘Checkbox Compliance’ TrapThe Reality Check
Asset AuthorisationTool checks if an employee has a laptop “assigned” in HR software.Demand the Removal Log. The tool doesn’t know if the user walked out with a 2nd unassigned monitor or server drive.
Encryption StatusSaaS tool identifies “Encryption Policy” is ‘Uploaded’.Demand the MDM Report. A policy is intent; the auditor must see the actual 100% encryption coverage report.
Physical CustodyPlatform marks “Compliant” because a training video was “Watched”.Verify Liability. The auditor must check for signed acceptance of responsibility for unattended assets.
Remote WipeTool shows a “Feature List” of the MDM provider.Test the Execution. The auditor should see a log of a successful test wipe for a decommissioned test device.
Patch ManagementTool marks “Patching Active” based on an office LAN scan.Check Offline Compliance. Assets used off-premises often miss patches if the scanner only checks the internal network.
Inventory IntegrityPlatform identifies assets as “In Use” based on purchase date.Verify the Ping. If a laptop hasn’t checked into MDM for 6 months, it is effectively lost/unmanaged regardless of GRC status.
Visual PrivacyTool logs that a “Clear Screen Policy” was marked as ‘Read’.Verify Hardware. GRC tools cannot see if a manager’s monitor faces a glass wall in a public café.
Fay Barker - High Table - ISO27001 Director

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top