ISO 27001:2022 Annex A 6.7 – Remote Working Explained

Remote working changes where work happens — not who is responsible for security.

Annex A 6.7 exists to ensure organisations protect information when personnel work remotely, recognising that homes, public spaces, and temporary locations introduce risks that do not exist in controlled office environments.

This control is about extending security beyond the office perimeter.

ISO 27001

Quick Guide: Annex A 6.7 at a Glance

Annex A 6.7 of ISO 27001:2022 focuses on secure remote working.

At a practical level, this means:

  • Defining conditions under which remote working is permitted
  • Protecting information accessed, processed, or stored remotely
  • Managing technical, physical, and behavioural risks
  • Ensuring secure access to systems and networks
  • Supporting personnel to work remotely without weakening security

The control does not prohibit remote working. It expects organisations to manage it deliberately and proportionately.

In-Depth Guide to Annex A 6.7

What Is Annex A 6.7 and Why Does It Matter?

Remote working introduces risks that are easy to underestimate, including:

  • Use of uncontrolled networks
  • Reduced physical security
  • Shared or public environments
  • Increased exposure to loss, theft, or unauthorised access
  • Blurred boundaries between personal and work activities

Without clear rules and safeguards:

  • Confidential information may be exposed
  • Devices may be compromised
  • Incidents may go undetected or unreported

Annex A 6.7 ensures organisations adapt information security controls to remote contexts, rather than assuming office-based controls still apply.

This control replaces the earlier concept of “teleworking” and reflects modern, flexible working practices.

How to Implement Annex A 6.7 Effectively

A pragmatic approach to Annex A 6.7 typically includes the following elements.

1. Define a Remote Working Policy

Organisations should define:

  • When and where remote working is permitted
  • Who is authorised to work remotely
  • What types of information can be accessed remotely

Clear policy sets expectations and boundaries.

2. Secure Remote Access to Systems and Networks

Remote access should be protected using appropriate technical controls.

This commonly includes:

  • Strong authentication
  • Secure remote access technologies
  • Segregation between personal and organisational environments
  • Monitoring of remote access activity

Access controls should reflect the sensitivity of information being accessed.

3. Protect Information in Remote Locations

Information handled remotely should be protected against:

  • Unauthorised viewing
  • Loss or theft
  • Accidental disclosure

This may involve:

  • Screen locking and inactivity timeouts
  • Restrictions on printing or local storage
  • Encryption of devices and communications

Remote environments require explicit safeguards.

4. Address Physical Security Risks

Physical security does not disappear outside the office.

Organisations should consider:

  • Who else may be present in the remote environment
  • Risk of shoulder surfing in public spaces
  • Secure storage of devices and documents
  • Transport of equipment and information

Physical exposure is often the weakest link in remote working.

5. Manage Use of Networks and Connectivity

Remote working frequently relies on networks outside organisational control.

Organisations may define:

  • Acceptable use of home or public networks
  • Restrictions on insecure wireless connections
  • Requirements for secure connectivity

Network risk should be acknowledged, not ignored.

6. Provide Equipment, Guidance and Support

Remote working is safer when organisations:

  • Provide suitable devices and tools
  • Restrict use of unmanaged or personal equipment where appropriate
  • Offer clear guidance on secure remote behaviour

Security improves when people are supported, not constrained.

7. Train and Raise Awareness for Remote Working

Personnel working remotely should understand:

  • Their security responsibilities
  • How to recognise and report incidents
  • How remote risks differ from office-based work

Awareness is particularly important when working outside normal supervision.

8. Revoke Access When Remote Working Ends

When remote working arrangements change or end, organisations should ensure:

  • Access rights are reviewed and updated
  • Equipment is returned or secured
  • Temporary permissions are removed

Temporary access should not become permanent by accident.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Practical Considerations

Annex A 6.7 does not require:

  • Identical controls for every remote worker
  • Prohibition of public or home working by default
  • Zero use of personal environments

It does require organisations to:

  • Assess remote working risk
  • Apply appropriate controls
  • Review arrangements as technology and working practices change

Remote working risk increases quietly when it is not revisited.

Common Challenges and How to Overcome Them

  • Treating remote working as low risk
  • Recognise physical and environmental exposure
  • Relying solely on VPNs or technology
  • Address people, process, and physical security
  • Unclear expectations for remote behaviour
  • Define and communicate remote working rules
  • Temporary arrangements becoming permanent
  • Review access and controls regularly

Remote working fails most often through assumption, not intent.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 6.7 is about maintaining security wherever work happens.

When remote working is managed effectively:

  • Flexibility does not undermine security
  • Information remains protected outside the office
  • People understand their responsibilities
  • Incidents are less likely and easier to manage

Work no longer happens in one place.
Annex A 6.7 ensures information security moves with it — deliberately and securely.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls