Remote Work
Implementation and audit guidance for securing remote work environments.
Guidance to Implement
Develop and distribute detailed guidelines for securing home networks. Offer remote support resources.
Guidance to Audit
Guideline documents and employee acknowledgment receipts.
Key Performance Indicator
X% of employees acknowledge and follow remote work security guidelines.
Guidance to Implement
Enforce VPN usage through network policies and continuously monitor remote connections.
Guidance to Audit
VPN usage logs and network access control reports.
Key Performance Indicator
X% of remote work connections use a secure VPN.
Guidance to Implement
Enforce conditional access based on device compliance. Integrate MDM/UEM solutions to restrict access only to enrolled; compliant devices.
Guidance to Audit
Review conditional access logs; device compliance reports; and platform access attempts from unauthorized devices.
Key Performance Indicator
X% of remote devices must comply with company-approved device policies.
Guidance to Implement
Deploy automated compliance scans for remote devices and remediate non-compliant cases promptly.
Guidance to Audit
Compliance scan reports and remediation records.
Key Performance Indicator
X% of remote devices pass compliance scans and are remediated within 24 hours.
Guidance to Implement
Deploy advanced access solutions (like jump servers) for critical systems and log all sessions.
Guidance to Audit
Session logs and advanced access configuration records.
Key Performance Indicator
X% of critical remote systems must use jump servers and log all access.
Guidance to Implement
Define categories of decisions (e.g.; financial transactions; legal decisions; customer escalations) that require secondary human validation when influenced by LLM outputs.
Guidance to Audit
Sample decisions influenced by AI tools and verify whether documented human validation or source triangulation is present. Cross-check logs with team leaders for spot compliance reviews.
Key Performance Indicator
X% of AI-generated recommendations are reviewed before action.
Guidance to Implement
Establish a pre-travel notification workflow
Guidance to Audit
Travel forms
Key Performance Indicator
X% of employees notify security before business travel and are educated on AI scams.
Guidance to Implement
Set up a dedicated reporting channel (e.g., hotline or mobile app) for travel-related incidents and train employees on its use.
Guidance to Audit
Incident reports and hotline call logs.
Key Performance Indicator
X% of travel-related incidents are reported; including AI-generated threats.
Guidance to Implement
Include hotel safe usage guidelines in travel protocols and encourage their use.
Guidance to Audit
Travel policy documents and employee acknowledgment records.
Key Performance Indicator
X% of employees use hotel safes and avoid risky networks during travel.
Guidance to Implement
Advise employees on data minimization and enforce encryption for any data carried during travel.
Guidance to Audit
Travel checklists and data minimization policy documents.
Key Performance Indicator
X% of sensitive data carried during business trips is encrypted and minimized.
Guidance to Implement
Incorporate clear guidelines for asset supervision during travel and emphasize vigilance in training.
Guidance to Audit
Travel supervision logs and incident reports.
Key Performance Indicator
X% of employees follow guidelines for asset supervision during business trips.
Guidance to Implement
Educate employees to lock their devices as soon as they are not in use. Reinforce via policy reminders.
Guidance to Audit
Policy documents and training attendance records.
Key Performance Indicator
X% of employees lock their devices when not in use during business trips.
Guidance to Implement
Provide guidelines on maintaining discretion during external interactions, include role-playing scenarios in training.
Guidance to Audit
Travel policy documents.
Key Performance Indicator
X% of employees practice discretion during external interactions to mitigate AI-related risks.