A.7.9 Security of assets off-premises
- Andy Systems
- ISMS Guides
A.7.9 Security of Assets Off-Premises would include:
-
Policy and Procedures: Documentation of policies and procedures outlining how assets are secured when taken off-premises, including laptops, mobile devices, portable storage media, or any other equipment containing sensitive information.
-
Asset Inventory: An up-to-date asset inventory that includes details of all assets that are allowed to be taken off-premises. This inventory should track the asset's owner, location, purpose, and any necessary security measures applied.
-
Asset Tracking and Accountability: Evidence of a system or process in place to track the movement of assets off-premises and ensure their accountability. This may involve check-in/check-out procedures or electronic tracking systems.
-
Encryption and Data Protection: Proof of encryption and data protection measures applied to sensitive information stored on assets taken off-premises. This is crucial to safeguard data in case of loss or theft.
-
Access Control: Documentation of access control measures implemented to restrict unauthorized access to off-premises assets. This may involve password protection, biometrics, or multi-factor authentication.
-
Physical Security Measures: Verification of physical security measures in place to protect assets during transit and at remote locations. This may include secure carrying cases, locks, or security seals.
-
Training and Awareness: Records of training and awareness programs provided to employees about the importance of safeguarding assets off-premises and the specific security measures to follow.
-
Incident Reports: Records of any security incidents related to assets taken off-premises, including the actions taken to mitigate the risks and prevent similar incidents in the future.
-
Compliance with Policies and Procedures: Confirmation that employees and users adhere to the established policies and procedures related to off-premises asset security.
-
Regular Audits and Reviews: Documentation of regular audits or reviews conducted to assess the effectiveness of off-premises asset security measures and identify areas for improvement.
By reviewing these pieces of evidence, an auditor can determine whether the organization has appropriate controls in place to secure assets when taken off-premises, mitigating the risk of loss, theft, or unauthorized access to sensitive information