The cleaning crew enters the office at 8 PM. On one desk: a printed list of all employee salaries. On another: a sticky note with “Admin PW: Welcome2024!” On a third: a USB drive labelled “Board Presentation — Confidential.” Every screen shows the Windows desktop — nobody locked their computer. By morning, the cleaners have seen more sensitive information than most employees. A.7.7 is one of the simplest controls in the standard — and one of the most frequently failed.
The control requires organizations to define and enforce rules for clearing desks of sensitive documents and locking screens when workstations are unattended. The goal is to reduce the risk of unauthorized access during and outside working hours.
What does the standard require?
The core requirements cover three areas:
- Clear desk. Sensitive documents, removable storage media and other information carriers must be stored securely (lockable drawer, cabinet, safe) when not in active use — especially when the person leaves their workstation or the office.
- Clear screen. Workstations must be locked or logged off when unattended. Automatic screen-lock after a defined period of inactivity must be enforced through technical controls.
- Printer and output management. Printed documents must be collected promptly. Uncollected printouts at shared printers are a data-exposure risk. Whiteboards and displays must be cleared of sensitive content after use.
In practice
Write a clear-desk and clear-screen policy. Keep it short, practical and specific: what must be locked away, how quickly the screen must lock, what to do with printouts, who enforces it. Distribute the policy to all staff and include it in awareness training.
Provide the infrastructure. Every workstation needs a lockable drawer or pedestal. Shared printers should have pull-print or badge-print functionality so that documents are only released when the owner is standing at the printer.
Conduct spot checks. Schedule unannounced walk-throughs — weekly or bi-weekly. Check desks for exposed documents, unlocked screens and uncollected printouts. Record findings (anonymized) and report trends to management.
Include in awareness training. Demonstrate the risk: show photos of real (anonymized) clean-desk violations found during spot checks. Practical examples are far more effective than abstract policy slides.
Typical audit evidence
Auditors typically expect the following evidence for A.7.7:
- Clear-desk and clear-screen policy — the approved policy document (link to Physical Security Policy in the Starter Kit)
- GPO/MDM configuration — proof that automatic screen lock is enforced
- Spot-check records — documented results of walk-through inspections
- Awareness training materials — slides or e-learning modules covering clear desk and clear screen
- Pull-print configuration — evidence that shared printers require badge authentication
- Lockable furniture inventory — evidence that all workstations have secure storage
KPI
% of workstations verified compliant with clear desk and clear screen policy
Measured through spot checks: what percentage of inspected workstations had no exposed sensitive documents, a locked screen (if unattended) and no visible credentials? Target: above 90%. Most organizations start at 40–60% and improve steadily with regular spot checks and awareness campaigns.
Supplementary KPIs:
- Number of clear-desk violations found per spot check (trending downward is the goal)
- % of workstations with enforced screen-lock timeout
- % of shared printers with pull-print enabled
- Number of uncollected printouts found per spot check
BSI IT-Grundschutz
A.7.7 maps to several BSI modules:
- INF.7.A6 (Clean desk policy) — explicitly requires a clear-desk policy for office workspaces.
- INF.7.A7 (Locking measures) — requires lockable furniture for every workstation.
- INF.7.A8 (Protection of workstations outside working hours) — extends clear-desk rules to cover periods when the office is unoccupied.
- SYS.2.1.A1 (User authentication) — covers screen lock and session management.
- ORP.4.A9 (Requirements for the handling of authentication means) — prohibits recording credentials on paper or sticky notes.
- INF.8.A1 / INF.8.A6 (Home workplace) — extends clear-desk rules to home offices.
Related controls
A.7.7 connects to information handling and access management:
- A.7.5 — Protecting against physical and environmental threats: Fire and flood are additional reasons to secure documents.
- A.7.6 — Working in secure areas: Clear-desk rules apply with extra rigor in secure areas.
- A.7.8 — Equipment siting and protection: How screens are positioned to prevent shoulder surfing.
- A.7.9 — Security of assets off-premises: Clear-desk principles extend to home offices and mobile workplaces.
Additional connections: A.5.10 (Acceptable use), A.5.12 (Classification of information) and A.5.17 (Authentication information).
Sources
- ISO/IEC 27001:2022 Annex A, Control A.7.7 — Clear desk and clear screen
- ISO/IEC 27002:2022 Section 7.7 — Implementation guidance for clear desk and clear screen
- BSI IT-Grundschutz, INF.7 — Office workspace