Blog | G5 Cyber Security

Personal Property in Security Scope

TL;DR

Generally, employees’ personal property isn’t automatically part of your security scope. However, it can become relevant if it connects to your company network or data, or is used for work purposes. This guide explains how to assess the risk and what steps you can take.

1. Understanding the Risk

Your primary security responsibility is protecting company assets (data, systems, etc.). Personal property introduces risks in these ways:

2. Assessing the Scope

Determine if personal property falls within your scope by asking these questions:

  1. Is it connected? Does the device/property connect directly or indirectly to your company network (wired, wireless, cloud services)?
  2. Does it store data? Is any company data stored on the property? If so, what type of data and how is it protected?
  3. Is it used for work? Is the property used for business-related tasks as part of an employee’s job description or with explicit company permission?

If the answer to any of these questions is ‘yes’, you need to consider including it in your security scope.

3. Policies and Procedures

Clear policies are essential. Here’s what to include:

Example AUP snippet:

Employees using personal devices to access company resources must maintain up-to-date antivirus software and strong passwords. Company data should not be stored locally on these devices without explicit permission from the IT department.

4. Technical Controls

Implement technical controls to mitigate risks:

Example command for checking firewall rules (Linux):

sudo iptables -L

5. Employee Training

Train employees on security best practices:

6. Legal Considerations

Consult with legal counsel regarding BYOD policies and employee privacy rights. Ensure your policies comply with relevant data protection regulations (e.g., GDPR, CCPA).

Exit mobile version