Skip to main content

Remote Work Security Policy

Effective Date: January 14, 2026 Last Updated: January 14, 2026 Version: 1.0.0 Owner: Security Team


Purpose

This policy establishes security requirements and best practices for Aragora team members working remotely. It ensures consistent security controls regardless of work location while maintaining productivity and flexibility.

SOC 2 Control: CC5-02 - Remote access security controls


Scope

This policy applies to:

  • All employees, contractors, and consultants
  • Any work performed outside Aragora office locations
  • All devices used to access Aragora systems remotely

Device Security

1. Approved Devices

Device TypeRequirements
Company-issued laptopsPrimary work device, fully managed
Personal devices (BYOD)Must meet security requirements below
Mobile devicesMDM enrollment required for email/Slack

2. Minimum Device Requirements

All devices accessing Aragora systems must have:

  • Full disk encryption enabled (FileVault, BitLocker, LUKS)
  • Operating system auto-updates enabled
  • Firewall enabled
  • Antivirus/endpoint protection (company-approved)
  • Screen lock after 5 minutes of inactivity
  • Strong password/biometric authentication
  • No jailbroken/rooted devices

3. Lost or Stolen Devices

Immediate Actions:

  1. Report to security@aragora.ai within 1 hour
  2. Initiate remote wipe if device had sensitive data
  3. Change all passwords used on the device
  4. Revoke any active sessions

Process:

1. Contact: security@aragora.ai
2. Subject: "Lost/Stolen Device - [Your Name]"
3. Include: Device type, last known location, data stored
4. IT will: Revoke certificates, wipe device, audit access logs

Network Security

1. VPN Requirements

ActivityVPN Required?
Accessing internal tools (admin panels)Yes
Accessing production databasesYes
Code review and developmentRecommended
Email and SlackNo (encrypted by default)
Public documentationNo

Approved VPN Clients:

  • WireGuard (preferred)
  • OpenVPN
  • Tailscale (for specific use cases)

2. Prohibited Networks

Do NOT access Aragora systems from:

  • Public WiFi without VPN (airports, cafes, hotels)
  • Shared computers (libraries, business centers)
  • Networks in high-risk countries (refer to compliance list)
  • Tor or anonymizing proxies

3. Home Network Security

Required:

  • WPA3 or WPA2 encryption on WiFi
  • Change default router password
  • Disable WPS (WiFi Protected Setup)
  • Keep router firmware updated

Recommended:

  • Separate IoT devices on guest network
  • Enable router firewall
  • Use DNS filtering (e.g., NextDNS, 1.1.1.2)

Authentication

1. Password Requirements

SystemMinimum LengthComplexityRotation
Aragora accounts14 charactersUpper, lower, number, symbol90 days
SSH keys4096-bit RSA or Ed25519N/AAnnual
API keys32 charactersRandomOn compromise

2. Multi-Factor Authentication (MFA)

Required for:

  • All Aragora accounts
  • Admin/owner roles (enforced, SOC 2 CC5-01)
  • SSH access to production servers
  • AWS console access
  • GitHub organization

Approved MFA Methods:

  • TOTP authenticator apps (Authy, Google Authenticator)
  • Hardware security keys (YubiKey)

Not Allowed:

  • SMS-based MFA (SIM swap risk)
  • Email-based MFA (phishing risk)

3. Session Management

Session TypeMaximum DurationIdle Timeout
Web dashboard24 hours30 minutes
API tokens1 yearN/A (revoke manually)
SSH sessions8 hours15 minutes
Admin sessions8 hours15 minutes

Data Handling

1. Data Classification Compliance

Remote workers must follow the Data Classification Policy:

ClassificationRemote Work Rules
PublicNo restrictions
InternalEncrypted storage only
ConfidentialVPN required, no local copies
RestrictedApproval required, audit logged

2. Prohibited Activities

Do NOT:

  • Store customer data on personal devices
  • Share credentials or access tokens
  • Take screenshots of sensitive data
  • Print confidential documents at home
  • Use personal cloud storage for work files
  • Access production data from untrusted networks

3. Approved Tools

CategoryApproved Tools
Code hostingGitHub (aragora org)
CommunicationSlack, Google Meet
DocumentationNotion, Google Docs
File sharingGoogle Drive (company domain)
Password management1Password (team vault)

Physical Security

1. Workspace Requirements

  • Private workspace (not visible to others)
  • Lockable space for devices when unattended
  • No shoulder-surfing risk during calls
  • Webcam awareness during video calls

2. Screen Privacy

  • Use privacy screen filter when working in public
  • Position monitor away from windows/public view
  • Lock screen when stepping away (Cmd+L / Win+L)
  • Close sensitive tabs before screen sharing

3. Document Handling

  • No printing of Confidential/Restricted data at home
  • Shred any work-related documents before disposal
  • Do not discuss sensitive matters in public spaces

Incident Response

1. Security Incidents

Report immediately to security@aragora.ai:

  • Suspected phishing attempts
  • Malware infections
  • Unauthorized access attempts
  • Lost or stolen devices
  • Data exposure

2. Incident Severity Levels

LevelExamplesResponse Time
CriticalData breach, ransomwareImmediate
HighAccount compromise, malware1 hour
MediumPhishing attempt (clicked)4 hours
LowSuspicious email (not clicked)24 hours

3. Contact Information

ContactUse For
security@aragora.aiSecurity incidents
it-support@aragora.aiDevice/access issues
#security-alerts (Slack)Real-time updates
On-call: +1-XXX-XXX-XXXXAfter-hours emergencies

Compliance Monitoring

1. Auditing

  • Device compliance checked quarterly
  • VPN usage logged and reviewed monthly
  • Access patterns monitored for anomalies
  • Annual security training completion tracked

2. Non-Compliance Consequences

ViolationFirst OffenseRepeat Offense
Missing MFAWarning + 24hr fix deadlineAccess suspended
Unencrypted deviceWarning + 48hr fix deadlineDevice quarantined
Public WiFi without VPNWarning + retrainingAccess review
Data policy violationFormal warningDisciplinary action

3. Exceptions

Request exceptions via security@aragora.ai:

  • Business justification required
  • Time-limited approval (max 30 days)
  • Compensating controls documented
  • Manager and Security approval

Training Requirements

1. Required Training

TrainingFrequencyDuration
Security awarenessAnnual1 hour
Phishing simulationQuarterlyOngoing
Remote work securityOn hire + annual30 min
Data handlingAnnual45 min

2. Resources

  • Security training portal: learn.aragora.ai/security
  • Security FAQ: Notion > Security > FAQ
  • Quick reference card: Notion > Security > Remote Work Checklist

Quick Reference Checklist

Daily Checklist

  • VPN connected for sensitive work
  • Screen locked when stepping away
  • Suspicious emails reported
  • Work data not on personal devices

Weekly Checklist

  • Device updates installed
  • Browser extensions reviewed
  • Downloaded files cleaned up

Monthly Checklist

  • Password manager audit
  • Unused access revoked
  • Home network security check

Document History

VersionDateChanges
1.0.02026-01-14Initial release