Clear Desk and Clear Screen
Plain English Translation
ISO 27001 Annex A.7.7 requires organizations to establish and enforce rules ensuring that sensitive information is not left exposed on desks or screens. This means defining a clear desk policy that mandates locking away paper documents and removable media, as well as a clear screen policy requiring automatic screen locks and application session timeouts on unattended computers.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Enforce basic auto screen lock timeout best practice settings on all employee laptops using MDM or Group Policy.
- Include clear desk guidelines in employee onboarding security training.
Required Actions (scaleup)
- Implement 'pull printing' (secure printing) where documents are only printed when the user physically authenticates at the printer.
- Enforce strict session timeouts for all internal web applications, forcefully logging users out after periods of inactivity.
Required Actions (enterprise)
- Conduct routine physical office sweeps to identify and remediate exposed documents, unlocked screens, or unattended whiteboards.
- Utilize physical privacy filters on screens for personnel processing highly sensitive data in open or public spaces.
A clear desk policy requires employees to clear sensitive information from their workspaces at the end of the day or when away. Auditors care because it prevents unauthorized visual access and physical theft of proprietary information.
ISO 27001:2022 Annex A control 7.7 requires organizations to formally define and enforce clear desk rules for papers and removable storage media, as well as clear screen rules for information processing facilities.
A clear desk and clear screen policy template must outline expectations for locking away paper documents, securing removable media handling clear desk policy, logging off or locking screens when unattended, and clearing whiteboards after meetings. Tools like WatchDog Security's Policy Management can help maintain the policy lifecycle with version control and acceptance tracking.
Yes, implementing ISO 27001 clear desk and clear screen rules is a mandatory control (Annex A.7.7), though the specific enforcement methods apply proportionately to the risks of your physical environments.
Practical controls include enforcing an auto screen lock timeout best practice via MDM, configuring application session timeouts in software, and providing physical privacy filters for screens used in high-traffic areas.
A secure printing policy ISO 27001 standard requires that documents containing sensitive data are not left sitting unattended on printer trays. This is often solved using 'pull printing,' which requires PIN or badge authentication at the device before printing begins.
Enforce rules by providing adequate secure storage like lockable drawers, implementing digital-first workflows to reduce paper use entirely, and automating screen locks to ensure compliance without relying on manual user action.
Clear desk policy audit evidence includes a published Information Security Policy defining the rules, MDM screenshots proving automated screen locks, application session timeout configurations, and records of physical office sweeps. WatchDog Security's Compliance Center can help organize evidence by control and highlight gaps before an audit.
Yes, a clear desk policy for remote workers is necessary. Employees working from home or public spaces must be trained to ensure family members or the public cannot view sensitive data on their screens or printed documents.
Organizations should perform periodic walkthroughs or compliance checks at planned intervals, such as quarterly or bi-annually, to verify that desks are clear and screens are actively locked when unattended, documenting the findings for management review.
Clear desk and clear screen programs usually fail when policies, acknowledgements, and evidence are scattered across teams. Tools like WatchDog Security's Policy Management can centralize the policy, track versioning and employee acceptance, and make it easier to show consistent enforcement during an ISO 27001 audit.
Periodic walkthroughs work best when findings are recorded consistently, assigned to owners, and trended over time for management review. WatchDog Security's Risk Register can log inspection findings as risks or issues, assign treatment actions, and support reporting on repeat observations and remediation status.
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-17 | WatchDog Security GRC Team | Initial publication |