...
Devices must be locked with a password (or equivalent control such as biometric) protected screensaver or screen lock after 10 20 minutes or less of non-use.
Devices must be locked whenever left unattended.
Devices storage must be encrypted.
Antivirus software must be installed and operational on the device.
Users must report any suspected misuse or theft of a mobile device immediately to the Security team (security@cloudcard.us)
Confidential information must not be stored on mobile devices or USB drives (this does not apply to business contact information, e.g., names, phone numbers, and email addresses).
Any mobile device used to access company resources (such as file shares and email) must not be shared with any other person.
Upon termination users agree to return all company owned devices and delete all company information and accounts from any personal devices.
...
Users shall not leave confidential materials unsecured on their desks or workspace and will ensure that screens are locked when not in use.
Remote Access Policy
CloudCard is a remote company. All business applications, administration interfaces, and other interactions are conducted over HTTPS or equivalent encrypted communications channel. Laptops and other computer resources that are used to access the CloudCard network resources must conform to the security requirements outlined in CloudCard’s Information Security Policies and adhere to the following standards:
To ensure mobile devices do not connect a compromised device to the company network, Antivirus policies require the use and enforcement of client-side antivirus software.
Antivirus software must be configured to detect and prevent or quarantine malicious software, perform periodic system scans, and have automatic updates enabled.
Users must not connect to any outside network without a secure, up-to-date software firewall configured on the mobile computer.
Users are prohibited from changing or disabling any organizational security controls such as personal firewalls , and antivirus software on systems used to access CloudCard resources.
Use of remote access software and/or services is allowable as long as Transport Layer Security (TLS or SSL) is used to encrypt the communication of the tool. This includes, but is not limited to, RDP, SSH, database connections, and web applications. For websites, ensure the URL contains https and that the lock icon in the browser bar is green(TLS or SSL) is used to encrypt communications.
Unauthorized remote access technologies may not be used or installed on any CloudCard system.
Users should avoid use of public Wi-Fi (e.g. coffee shop, hotel) for any CloudCard business, and should instead use a personal or CloudCard owned mobile hotspot. In situations where public Wi-Fi use is necessary, the same remote access precautions should be followed.
Users must not access CloudCard resources from a public computer (e.g., from a business center, hotel, etc.). Contact security or your supervisor if you are unable to reach your CloudCard issued laptop and have a business need to do so.
...
Version | Date | Description | Author | Approved by |
1.0 | 2017-11-02 | Initial Version | Tony Erskine | |
1.1 | 2018-08-22 | Review / Minor Updates | Tony Erskine | |
1.2 | 2018-10-19 | Review / Minor Updates | Tony Erskine | |
1.3 | 2019-12-05 | Security Awareness Training Requirement | Luke Rettstatt | |
1.4 | 2020-03-17 | AWS Security References Multi Factor Authentication | Luke Rettstatt | |
2.0 | 2020-04-07 | Access Control Policy Data Management Policy Roles and Responsibilities Background Check Requirement | Luke Rettstatt | |
2.1 | 2020-04-20 | Encryption Standards Secure Deletion Standards | Tony Erskine | |
2.2 | 2020-11-24 | Patching Standards | Tony Erskine | |
2.3 | 2020-12-01 | Review / Minor Updates | Luke Rettstatt | |
2.4 | 2021-03-11 | Annual Review | Tony Erskine | |
2.5 | 2022-03-20 | Annual Review | Tony Erskine | |
2.6 | 2022-07-06 | Update Job Titles | Tony Erskine | |
3.0 | 2023-03-15 | Converted to SOC Compliant Template | Ryan Heathcote | Luke Rettstatt |
3.1 | 2024-07-16 | Spelling and grammar improvements | Luke Rettstatt | Ryan Heathcote |
3.2 | 2024-08-17 | Clarified Remote Work Security Strategy | Ryan Heathcote | Luke Rettstatt |