S 5.8 Telecommuting
Description
Telecommuting is understood to refer to all tasks that are performed completely or periodically outside of the building of the employer and/or customer using information and communication technology. The tasks are performed with the help of a communication link to the IT of the employer and/or customer.
There are various forms of telecommuting: for example, home-based telecommuting from the residence of the employee or mobile telecommuting while on the road. It is also possible for the employees to work at the customer's or supplier's location within the framework of on-site telecommuting and to work there using equipment supplied by their employer. Another telecommuting method is to telecommute from so-called telecentres or even satellite or neighbourhood offices.
There are two basic types of home-based telecommuting, telecommuting in which the work is performed only at home and alternating telecommuting. In alternating telecommuting, the employee alternates between working from a home office and working at the workplace of their employer.
This module concentrates on the forms of telecommuting performed exclusively or only in part from the home environment. It is assumed that a telecommunication link is available between the workplace at home and the organisation that allows data to be exchanged or access to the data in the organisation as well when this is necessary.
The recommended safeguards of this module cover four different areas:
- the organisation of telecommuting,
- the telecommuting workstation of the telecommuter,
- the communication link between the telecommuting workstation and the organisation, and
- the communications computer at the organisation used to connect the telecommuting workstation.
The recommended safeguards listed in this module are concentrated on additional security requirements that apply to the IT systems used for telecommuting purposes, but also on the information processed while telecommuting. Security requirements are formulated for the technical components of telecommuting in particular (telecommuting workstation, communication connection, and communications computer) and these requirements must be met by selecting suitable IT systems during the actual design phase.
Threat scenario
The following typical threats to IT-Grundschutz in the area of telecommuting are assumed to exist:
Force Majeure
T 1.1 | Loss of personnel |
Organisational Shortcomings
T 2.1 | Lack of, or insufficient, rules |
T 2.4 | Insufficient monitoring of security safeguards |
T 2.7 | Unauthorised use of rights |
T 2.22 | Lack of or insufficient evaluation of auditing data |
T 2.24 | Loss of confidentiality of sensitive data of the network to be protected |
T 2.49 | Lack of, or inadequate, training of telecommuters |
T 2.50 | Delays caused by a temporarily restricted availability of telecommuters |
T 2.51 | Poor integration of telecommuters into the information flow |
T 2.53 | Inadequate regulations concerning the substitution of telecommuters |
Human Error
T 3.1 | Loss of data confidentiality or integrity as a result of user error |
T 3.3 | Non-compliance with IT security measures |
T 3.9 | Improper IT system administration |
T 3.13 | Passing on false or internal information |
T 3.16 | Incorrect administration of site and data access rights |
T 3.30 | Unauthorised private use of telecommuting workstations |
Technical Failure
T 4.13 | Loss of stored data |
Deliberate Acts
T 5.1 | Manipulation or destruction of equipment or accessories |
T 5.2 | Manipulation of information or software |
T 5.9 | Unauthorised use of IT systems |
T 5.10 | Abuse of remote maintenance ports |
T 5.18 | Systematic trying-out of passwords |
T 5.19 | Abuse of user rights |
T 5.20 | Misuse of administrator rights |
T 5.21 | Trojan horses |
T 5.71 | Loss of confidentiality of classified information |
Method recommendation
To secure the information system examined, other modules will need to be implemented in addition to this module. These modules are selected based on the results of the IT-Grundschutz modelling process.
A host of safeguards must be implemented to ensure security in the area of telecommuting, starting in the planning and design phases, through the purchasing phase, and up to the contingency planning phase. The steps to take to accomplish this and the safeguards to consider in each of the steps are listed in the following. Safeguards for providing infrastructural security to the telecommuter workplace are described in module S 2.8 Home workplace. It is also necessary to implement the appropriate client module for the IT system used as a telecommuting workstation.
Planning and design
A concept for telecommuting should be drawn up that states the security objectives, the protection requirements of the information processed while telecommuting, as well as the risks and security safeguards (see S 2.117 Creating a security concept for telecommuting).
Organisational rules and regulations as well as personnel safeguards are a prerequisite for secure telecommuting. Special attention must be paid to the special duties of telecommuters and to instructing them regarding the rules for using the communication connections. They are described in the following safeguards:
- S 2.113 Requirements documents concerning telecommuting
- S 2.116 Regulated use of telecommuting communication capabilities
- S 2.117 Creating a security concept for telecommuting
- S 3.21 Training of telecommuters as regards security-related issues
Implementation
Once the preparatory organisational and planning tasks have been completed, the telecommuting workstations, communication computers, and other IT systems can be installed. The following safeguards must be taken into account during installation:
- Security of the telecommuting workstation: The telecommuting workstation must be designed in such a way that it can be used securely in an insecure operating environment. In particular, only one person should be authorised to use the telecommuting workstation online and offline. The security requirements in S 4.63 Security-related requirements for telecommuting computers must be taken into consideration in particular.
Secure communication between the telecommuting workstation and the organisation: Since communication is performed using public networks (ISDN or DSL connections, for example), special security requirements must be met for communication between the telecommuting workstation and the organisation. These requirements are described in S 5.51 Security-related requirements for communication links between telecommuting workstations and the institution. Module S 4.5 LAN connection of an IT system via ISDN must be taken into consideration when the telecommuting workstation connects using public networks. Module S 4.4 VPN must be taken into consideration when the telecommuting workstation connects using a virtual private network (VPN). - Security of the communications computer of the organisation: This computer is a quasi-public interface that the telecommuter can use to access the IT and data of the organisation. Since misuse of this computer by third parties must be prevented, there are special security requirements for this computer that are described in safeguard S 5.52 Security-related requirements for communications computers.
Operation
The users have a major impact on security during telecommuting. For this reason, the telecommuters must be required to follow the security policies and must receive training on the use of the IT systems (see S 3.21 Training of telecommuters as regards security-related issues).
Contingency Planning
All relevant data created or changed in the telecommuting context must be backed up (see S 6.47 Storage of backup copies as part of telecommuting).
The bundle of security safeguards for telecommuting is presented in the following.
Planning and design
S 2.113 | (A) | Requirements documents concerning telecommuting |
S 2.114 | (A) | Flow of information between the telecommuter and the institution |
S 2.115 | (B) | Care and maintenance of workstations for telecommuting |
S 2.116 | (A) | Regulated use of telecommuting communication capabilities |
S 2.117 | (A) | Creating a security concept for telecommuting |
S 2.205 | (C) | Transmission and retrieval of personal data |
S 2.241 | (C) | Procedure for carrying out a teleworkstation requirements analysis |
Implementation
S 4.63 | (A) | Security-related requirements for telecommuting computers |
S 5.51 | (A) | Security-related requirements for communications links between telecommuting workstations and the institution |
S 5.52 | (A) | Security-related requirements for communications computers |
Operation
S 3.21 | (A) | Training of telecommuters as regards security-related issues |
Contingency Planning
S 6.47 | (B) | Storage of backup copies as part of telecommuting |