CISA and NSA release guidance for securing VPNs

Cyber Security

What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks

The NSA and CISA have released joint guidance to help organizations select their Virtual Private Network (VPN) solution and hardening it against compromise.

Vulnerable VPN servers are attractive targets for threat actors, as they provide great opportunities for infiltrating the victims’ systems and networks. “Multiple nation-state advanced persistent threat (APT) actors have weaponized common vulnerabilities and exposures (CVEs) to gain access to vulnerable VPN devices. Exploitation of these CVEs can enable a malicious actor to steal credentials, remotely execute code, weaken encrypted traffic’s cryptography, hijack encrypted traffic sessions, and read sensitive data from the device,” said the NSA in its press release.

As the NSA pointed out, a threat actor who establishes a foothold in a system can go on and wreak all sorts of havoc on an organization’s network.

Dubbed “Selecting and Hardening Remote Access VPN Solutions”, the guidance sets out rules, or rather recommendations, that organizations and companies should follow when choosing a remote access VPN that will grant entry to their systems. This includes adhering to tried-and-tested solutions that are compliant with industry standards and can be found on product compliance lists, and VPN services that have clearly identified standards and technologies that they use to establish VPN connections.

Other advice also includes relying on reputable vendors with a proven track record in remediating any vulnerabilities promptly, following cybersecurity best practices, and using strong authentication credentials.

Meanwhile, when it comes to hardening VPNs, the NSA-CISA information sheet recommends that organizations should:

  • configure strong cryptography and authentication
  • run only the most necessary features and so help reduce the attack surface
  • protect and monitor access to and from their VPN connections

Naturally, the sheet goes into greater detail and includes advice long echoed by cybersecurity professionals, such as using multi-factor authentication and applying patches and security updates as soon as possible to mitigate any known vulnerabilities.

While the advice is aimed at improving the security of the Department of Defense, National Security systems and the Defense Industrial Base, following these recommendations would benefit any organization or company, public or governmental, that uses a VPN solution to access its systems.

Products You May Like

Articles You May Like

U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider
ENISA Launches First State of EU Cybersecurity Report
Horns&Hooves Campaign Delivers RATs via Fake Emails and JavaScript Payloads
UK Justice System Failing Cybercrime Victims, Cyber Helpline Finds
INC Ransom Claims Cyber-Attack on UK Children’s Hospital

Leave a Reply

Your email address will not be published. Required fields are marked *