Bearbeiten

Freigeben über


Best practices to protect frontline workers

Frontline workers are the backbone of every organization. They keep warehouses stocked, ensure machines run smoothly, organize store locations, and serve as the first contact point for customers. We depend on them to deliver consistent quality at an accelerated pace while managing personal safety risks, increased theft, and ongoing supply chain disruptions.

An increasing set of organizations are enabling their information workers (IWs) and frontline workers (FLWs) to collaborate in the same cloud-based applications, such as SharePoint, Teams, etc. Because those cloud-based applications are available on the Internet, the organizations need to consider how to secure the environment, including protecting against remote account break-ins.

For their information workers, many organizations want to empower their users to work more securely anywhere and anytime, on any device as described in Microsoft’s Zero Trust best practices. However, many frontline workers don't fall into the model of needing anywhere/anytime/any-device access. Instead, most the frontline workers fall into the model of needing two types of access:

  • Work access (on-shift): While at work, a frontline worker could require access to sensitive applications.

  • Home access (off-shift): While at home or away from the worksite, most frontline workers aren't expected to perform work duties. However, they might require access to non-sensitive work applications for off-shift communication, signing up for shifts, or reviewing training material. In some cases, they could also require access to sensitive personal resources such as paystub or W2.

This article outlines the best practices for protecting frontline workers across various home or work access scenarios. To fully grasp these security tips, it's important to first understand the various types of devices frontline workers use in different settings.

Device types used in frontline worker environments

There are three main device types used by frontline workers in most scenarios:

  • Shared devices: These are company-owned devices that are shared between employees across tasks, shifts, or locations.

  • Bring Your Own Device (BYOD): Some organizations use a bring-your-own-device model where frontline workers use their personal devices to access business apps.

  • Company-owned single user devices: These devices are assigned to a specific employee for work purposes only, not for personal use. Although this device model is less frequent, we recommend that organizations using it for their frontline workers to follow the anywhere/anytime/any-device best practices as described in Microsoft’s Zero Trust best practices.

Security controls for frontline worker environments

The following security controls are recommended to secure frontline workers across various settings:

Security Controls Description
Mobile Device Management (MDM) Managed To secure devices and the data they access, admins are recommended to manage them using an MDM like Microsoft Intune.
Shared Device Mode (SDM) enabled Shared device mode is a feature that allows organizations to configure an iOS, iPadOS, or Android device for multiple employees to share. Employees can pick a device from the shared pool, sign in once, and they automatically gain access to all SDM-supported apps through single sign-on (SSO). When their shift ends, they sign out globally on the device, which removes their personal and company information from all SDM-supported applications. They can then return their device to the pool, while ensuring a secure handoff to the next worker as other users can't see or access their information.
We recommend enabling SDM on your shared devices. In addition to Microsoft Intune, check out other third-party MDMs that support Microsoft Entra shared device mode.
Application protection policies Intune App Protection Policies (APP) ensure organizational data remains safe within managed apps. For enhanced security, set up Microsoft Entra Conditional Access policies to ensure your apps are secured with an app protection policy before granting access to users.
Inactivity screen lock Configure inactivity screen lock and auto sign-out functionalities using launcher apps like Managed Home Screen to protect shared corporate devices from unauthorized access by malicious coworkers with physical access.
On BYOD, configure screen lockout capabilities on iOS and Android to prevent local attacks.
Device compliance Deploying Microsoft Intune or a supported third-party MDM enables organizations to enforce compliance requirements for devices. Administrators can set policies to ensure devices meet security standards such as requiring a minimum OS version, preventing use of jailbroken or rooted devices, and more.
When configured, the MDM sends policy compliance information to Microsoft Entra ID. This data is used by Device Compliance Conditional Access policy to determine whether to grant or block access to resources, ensuring that only users with compliant devices can access organizational resources.
Interactive user authentication Interactive user authentication ensures that only authorized users can access resources when they sign in to a device, application, or service. Admins should choose the Microsoft Entra ID authentication methods that meet or exceed their organization's security, usability, and availability standards.

Access scenarios for frontline workers

Work access (on-shift)

While at work, a frontline worker could be given access to sensitive applications from a secured or public location or network. Such a scenario requires stricter controls on all device types, including shared, BYOD, and company owned single user devices.

The recommended best practice is to allow access only from MDM-managed and compliant devices. This enables the identity system to silently verify the first key aspect of device compliance before proceeding with interactive user authentication, preferably MFA, to enhance security before granting access. Other recommendations to secure users and prevent data-loss scenarios include:

Home access (off-shift)

At home, frontline workers should have restricted access to non-sensitive business applications needed for limited off-shift communication or reviewing basic training material. Some organizations might also allow access to sensitive personal data like paystubs. For these scenarios, we recommend the following security best practices:

  • Enable interactive multifactor authentication
  • Apply inactivity screen lock and App Protection Policies.
  • Follow the anywhere/anytime/any-device best practices as described in Microsoft's Zero Trust best practices in scenarios where your organization needs to provide access to sensitive applications to frontline workers while off-shift.

Note

Although many organizations follow the frontline workers home or work access model, some organizations might have internal policies that enable employees to access any device from anywhere and at any time. Such organizations need to apply the same policies on frontline workers as information workers and would thus follow anywhere/anytime/any-device best practices as described in Microsoft's Zero Trust best practices.

Best practices for protecting frontline workers

The following image provides a summary of the recommended best practices for securing frontline workers in across the various home or work access scenarios described in the previous sections.

Screenshot that shows possible scenarios when working with frontline workers.

Get started with the best practices for securing frontline workers

To apply the best practices for your frontline workers, take the following steps

  1. Map your frontline worker scenario to one of the scenarios listed in this article.

  2. Review the applicable security controls:

  3. Apply the controls as per the best practices recommended for your scenario.