Secured system environment / Technical requirements
Only use the secure system environment of your company. The technical requirements are based on the IT Basic Protection Compendium:
Above all, it is important to have secure VPN access to the company network and an encrypted hard disk. Furthermore, two-factor authentication is
authentication is also a legal standard. A complete overview of all technical requirements can be found at the end of this checklist.
Technical details
All technical details for a correct technical implementation of the legal requirements can be found under the following links:
- https://www.bsi.bund.de/DE/Themen/ITGrundschutz/ITGrundschutzKompendium/bausteine/OPS/OPS_1_2_4_Telearbeit.html
- https://www.bsi.bund.de/DE/Themen/ITGrundschutz/ITGrundschutzKompendium/bausteine/INF/INF_9_Mobiler_Arbeitsplatz.html
- https://www.bsi.bund.de/DE/Themen/ITGrundschutz/ITGrundschutzKompendium/bausteine/INF/INF_8_H%C3%A4uslicher_Arbeitsplatz.html