SOC 2 for Remote Teams: Endpoint, Access, and Training
SOC 2 controls for fully remote and distributed teams — covering MDM for remote endpoints, VPN or Zero Trust access, remote work policies, and security awareness training evidence.
- Remote team SOC 2 requires MDM enrollment for all company-managed laptops as a CC6.7 endpoint control.
- Zero Trust Network Access (Cloudflare Access, Tailscale) replaces VPN and provides better access logs.
- Annual security awareness training with completion tracking satisfies CC1.4 and CC2.2 criteria.
- Remote work policies must address clean desk, screen lock, home network security, and unsecured Wi-Fi use.
- Device trust enforcement in your IdP (Okta Device Trust, Entra ID Conditional Access) blocks unmanaged devices from production systems.
- Endpoint detection and response (EDR) on all remote endpoints satisfies CC7.2 monitoring criteria for the device layer.
In this guide
SOC 2 Challenges for Remote Teams
A distributed, fully remote team introduces SOC 2 challenges that office-based teams do not face: endpoints are on home networks without enterprise network controls, company laptops mix with personal devices, security awareness is harder to maintain without in-person culture reinforcement, and physical security of workstations (CC6.4) must be enforced by policy rather than building access controls.
The good news: remote-first companies that adopt Zero Trust security principles from the start often have stronger access controls than office-based companies that rely on "being inside the network" as a security boundary. A remote team with MDM, Zero Trust access, and enforced device trust can demonstrate more granular access controls than a traditional office environment with a flat internal network.
MDM Enrollment and Endpoint Controls (CC6.7)
Every company-managed laptop and mobile device must be enrolled in MDM. Options: Jamf (Mac-focused, widely used for engineering teams), Microsoft Intune (Windows and Mac, integrates with Azure AD), or Kandji (Mac-focused, modern UI). For a Mac-heavy engineering team, Jamf Pro or Kandji are the standard choices. Enforce the following MDM policies: full-disk encryption (FileVault on Mac, BitLocker on Windows) enabled, screen lock after 5 minutes of inactivity, password complexity requirements, automatic OS updates within 30 days of release, and remote wipe capability.
Require MDM enrollment on day one of employment. Include MDM enrollment as a step in your onboarding checklist in your HRIS. Before a new employee receives access to any production system, verify their device is MDM-enrolled and compliant. This creates a documented chain: HRIS start date → device enrollment date → first production system access date, demonstrating that CC6.2 access provisioning followed proper endpoint verification.
Run weekly compliance reports from MDM: devices that are non-compliant (unenrolled, encrypted not enabled, OS out of date). Follow up with device owners within 3 business days. Remove production system access from chronically non-compliant devices. Export these compliance reports monthly as CC6.7 endpoint security evidence.
Zero Trust Access to Production (CC6.6)
Traditional VPN creates a flat internal network — once a remote employee connects to VPN, they may have broad access to many internal systems. Zero Trust Network Access (ZTNA) replaces this with per-application, per-user access control. Options: Cloudflare Access (Zero Trust), Tailscale (mesh VPN with access controls), HashiCorp Boundary (application access manager), or AWS Client VPN with per-user IAM controls.
With Cloudflare Access: deploy Cloudflare Tunnel on your internal services (Grafana, internal admin, Kubernetes dashboard). Configure Access policies requiring valid SSO session + device enrolled in MDM (device posture check). Every access attempt generates a log entry in Cloudflare Access with the user identity, device, timestamp, and accessed URL. These logs are more granular than traditional VPN logs and are exportable as CC6.6 boundary protection evidence.
For SSH access to production servers: use a bastion host or Cloudflare Access SSH tunneling instead of exposing SSH ports. With Cloudflare Access SSH, the engineer authenticates via SSO before establishing an SSH connection — the session is logged and terminated by the Access policy, not just at the TCP level. Alternatively, use AWS Systems Manager Session Manager (SSM), which provides auditable shell access without any exposed SSH ports.
Device Trust in Your IdP
Device trust enforcement in your identity provider ensures that only MDM-enrolled, compliant devices can access production applications. In Okta: enable Okta Device Trust under Settings → Features → Okta Device Trust. Configure an authentication policy rule: "If device is not managed, then deny access to production apps." This blocks access from personal laptops, even if the user authenticates with valid credentials and MFA.
In Azure AD / Entra ID: enable Conditional Access policy "Require compliant device" for production application groups. Devices are marked as compliant in Intune when they meet your MDM policies (encryption, screen lock, OS version). Compliant device checks happen at every Conditional Access evaluation, not just at enrollment time — if a device becomes non-compliant (OS update deferred too long), access is blocked until the issue is resolved.
Communicate device trust enforcement to employees during onboarding. Provide a clear process for personal device exceptions (consulting, contractors) — typically, personal devices can access email and calendar via managed apps (Outlook Mobile, Gmail with MDM enrolled) but cannot access production systems. Document this exception class in your access control policy and implement it via IdP conditional access rules.
EDR and Endpoint Monitoring (CC7.2)
Endpoint Detection and Response (EDR) tools monitor endpoint activity for threats: malware execution, lateral movement, suspicious process spawning, data exfiltration. For remote teams, EDR compensates for the lack of network-level monitoring (there is no corporate perimeter to monitor). Options: CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint (included with Microsoft 365 Business Premium), or Carbon Black.
Deploy EDR on all company endpoints via MDM — this ensures new device enrollments automatically receive EDR. Configure EDR to send alerts to your SIEM or security team Slack channel. Review EDR alert summary reports monthly. Include EDR deployment coverage (% of enrolled devices with EDR installed) in your monthly security report as CC7.2 evidence of endpoint monitoring.
For macOS: Apple's built-in XProtect and Gatekeeper provide baseline malware protection. MDM can enforce Gatekeeper settings (only allow apps from identified developers or App Store). Supplement with a commercial EDR tool for behavioral detection that XProtect does not cover. For Linux servers (not covered by MDM): deploy a lightweight agent like CrowdStrike Falcon Sensor or auditd with log forwarding to your SIEM.
Security Awareness Training (CC1.4)
CC1.4 requires that all personnel are trained on their information security responsibilities. Annual security awareness training satisfies this criterion. Training must cover: phishing recognition and reporting, password management (use a password manager, do not reuse), acceptable use of company systems, incident reporting procedure, physical security for remote work (screen lock, clean desk, no shoulder surfing in public), and data handling requirements for customer data.
Use a training platform that tracks completion: KnowBe4, Proofpoint Security Awareness, Ninjio, or even a simpler platform like TalentLMS. Completion must be tracked with per-user records showing training name, completion date, and score (if applicable). Do not use an all-company email saying "please read this PDF" — that provides no completion evidence. Export the completion report quarterly and file it as CC1.4 evidence. Target 100% completion within 30 days of assignment, with a reminder process for non-completers.
For new employees: assign security awareness training as part of the onboarding checklist with a 7-day completion deadline before production system access is granted. This ensures new joiners are trained before they touch company systems. Document this requirement in your Security Awareness Training Policy and verify it is enforced in your onboarding HRIS workflow.
Remote Work Policy Requirements
A Remote Work Policy formalizes security expectations for distributed team members. Required elements: (1) All company work must occur on MDM-enrolled company devices (not personal laptops). (2) No working from public Wi-Fi without VPN or ZTNA connection active. (3) Screen lock required whenever leaving the desk unattended. (4) Clean desk required — no sensitive documents (printed or on screen) visible to household members or in video call backgrounds.
(5) Physical workstation security: home office door should be locked when not occupied if other household members are present. Do not participate in sensitive calls in coffee shops or coworking spaces where audio can be overheard. (6) Hardware must be returned within 3 business days of employment termination — include this in the employment agreement. Lost or stolen devices must be reported within 4 hours so MDM remote wipe can be triggered before data is at risk.
Include the Remote Work Policy in your new hire onboarding and require a digital acknowledgment signature (via DocuSign, HelloSign, or HRIS). The signed acknowledgment is evidence that the employee received and agreed to the policy, satisfying CC1.4 communication of security responsibilities. Collect re-acknowledgments annually alongside security awareness training completion.
Frequently Asked Questions
Do personal devices need to be in scope for SOC 2 for a remote team?
What is the minimum MDM setup for SOC 2?
Can we use Tailscale instead of a traditional VPN for SOC 2?
How do we handle security awareness training for contractors and part-time workers?
What is a good phishing simulation program for a remote team?
Automate your compliance today
AuditPath runs 86+ automated checks across AWS, GitHub, Okta, and 14 more integrations. SOC 2 and DPDP Act. Free plan available.
Start for free