S 5.8 Telecommuting

Logo Telearbeit

Description

Telecommuting is understood to refer to all tasks that are performed completely or periodically outside of the building of the employer and/or customer using information and communication technology. The tasks are performed with the help of a communication link to the IT of the employer and/or customer.

There are various forms of telecommuting: for example, home-based telecommuting from the residence of the employee or mobile telecommuting while on the road. It is also possible for the employees to work at the customer's or supplier's location within the framework of on-site telecommuting and to work there using equipment supplied by their employer. Another telecommuting method is to telecommute from so-called telecentres or even satellite or neighbourhood offices.

There are two basic types of home-based telecommuting, telecommuting in which the work is performed only at home and alternating telecommuting. In alternating telecommuting, the employee alternates between working from a home office and working at the workplace of their employer.

This module concentrates on the forms of telecommuting performed exclusively or only in part from the home environment. It is assumed that a telecommunication link is available between the workplace at home and the organisation that allows data to be exchanged or access to the data in the organisation as well when this is necessary.

The recommended safeguards of this module cover four different areas:

The recommended safeguards listed in this module are concentrated on additional security requirements that apply to the IT systems used for telecommuting purposes, but also on the information processed while telecommuting. Security requirements are formulated for the technical components of telecommuting in particular (telecommuting workstation, communication connection, and communications computer) and these requirements must be met by selecting suitable IT systems during the actual design phase.

Threat scenario

The following typical threats to IT-Grundschutz in the area of telecommuting are assumed to exist:

Force Majeure

T 1.1 Loss of personnel

Organisational Shortcomings

T 2.1 Lack of, or insufficient, rules
T 2.4 Insufficient monitoring of security safeguards
T 2.7 Unauthorised use of rights
T 2.22 Lack of or insufficient evaluation of auditing data
T 2.24 Loss of confidentiality of sensitive data of the network to be protected
T 2.49 Lack of, or inadequate, training of telecommuters
T 2.50 Delays caused by a temporarily restricted availability of telecommuters
T 2.51 Poor integration of telecommuters into the information flow
T 2.53 Inadequate regulations concerning the substitution of telecommuters

Human Error

T 3.1 Loss of data confidentiality or integrity as a result of user error
T 3.3 Non-compliance with IT security measures
T 3.9 Improper IT system administration
T 3.13 Passing on false or internal information
T 3.16 Incorrect administration of site and data access rights
T 3.30 Unauthorised private use of telecommuting workstations

Technical Failure

T 4.13 Loss of stored data

Deliberate Acts

T 5.1 Manipulation or destruction of equipment or accessories
T 5.2 Manipulation of information or software
T 5.9 Unauthorised use of IT systems
T 5.10 Abuse of remote maintenance ports
T 5.18 Systematic trying-out of passwords
T 5.19 Abuse of user rights
T 5.20 Misuse of administrator rights
T 5.21 Trojan horses
T 5.71 Loss of confidentiality of classified information

Method recommendation

To secure the information system examined, other modules will need to be implemented in addition to this module. These modules are selected based on the results of the IT-Grundschutz modelling process.

A host of safeguards must be implemented to ensure security in the area of telecommuting, starting in the planning and design phases, through the purchasing phase, and up to the contingency planning phase. The steps to take to accomplish this and the safeguards to consider in each of the steps are listed in the following. Safeguards for providing infrastructural security to the telecommuter workplace are described in module S 2.8 Home workplace. It is also necessary to implement the appropriate client module for the IT system used as a telecommuting workstation.

Planning and design

A concept for telecommuting should be drawn up that states the security objectives, the protection requirements of the information processed while telecommuting, as well as the risks and security safeguards (see S 2.117 Creating a security concept for telecommuting).

Organisational rules and regulations as well as personnel safeguards are a prerequisite for secure telecommuting. Special attention must be paid to the special duties of telecommuters and to instructing them regarding the rules for using the communication connections. They are described in the following safeguards:

Implementation

Once the preparatory organisational and planning tasks have been completed, the telecommuting workstations, communication computers, and other IT systems can be installed. The following safeguards must be taken into account during installation:

Operation

The users have a major impact on security during telecommuting. For this reason, the telecommuters must be required to follow the security policies and must receive training on the use of the IT systems (see S 3.21 Training of telecommuters as regards security-related issues).

Contingency Planning

All relevant data created or changed in the telecommuting context must be backed up (see S 6.47 Storage of backup copies as part of telecommuting).

The bundle of security safeguards for telecommuting is presented in the following.

Planning and design

S 2.113 (A) Requirements documents concerning telecommuting
S 2.114 (A) Flow of information between the telecommuter and the institution
S 2.115 (B) Care and maintenance of workstations for telecommuting
S 2.116 (A) Regulated use of telecommuting communication capabilities
S 2.117 (A) Creating a security concept for telecommuting
S 2.205 (C) Transmission and retrieval of personal data
S 2.241 (C) Procedure for carrying out a teleworkstation requirements analysis

Implementation

S 4.63 (A) Security-related requirements for telecommuting computers
S 5.51 (A) Security-related requirements for communications links between telecommuting workstations and the institution
S 5.52 (A) Security-related requirements for communications computers

Operation

S 3.21 (A) Training of telecommuters as regards security-related issues

Contingency Planning

S 6.47 (B) Storage of backup copies as part of telecommuting