• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

NSA, CISA Release VPN Selection, Hardening Guidance

Document is designed to help organizations select standards-based VPN solutions and harden networks to prevent compromise from bad actors.

September 30, 2021 Zachary Comeau Leave a Comment

CISA NSA VPN

The U.S. National Security Agency and Cybersecurity and Infrastructure Security Agency have jointly released a new guidance resource on selecting and hardening virtual private network (VPN) solutions to help organizations address security risks associated with the popular tools.

Especially in this new age of remote/hybrid work, VPNs have become a popular resource for organizations with a dispersed workforce as they are designed to keep information sent over the internet private and secure, but they can be vulnerable to exploitation by malicious actors, the agencies say.

The guidance is designed to help organizations select standards-based VPN solutions and harden those networks to prevent compromise from bad actors.

The agencies define VPNs as a tool that allow users to remotely connect to a corporate network via secure tunnel.

“Through this tunnel, users can take advantage of the internal services and protections normally offered to on-site users, such as email/collaboration tools, sensitive document repositories, and perimeter firewalls and gateways,” the agencies say. “Because remote access VPN servers are entry points into protected networks, they are targets for adversaries.”

The document provides guidance on how to select a standards-based VPN from a reputable vendor with a track record of quickly fixing vulnerabilities and other best practices, as well as hardening the VPN by configuring strong cryptography and authentication, running only strictly necessary features and protecting and monitoring access.

According to the agencies, bad actors exploit VPNs to harvest credentials, weaken encrypted traffic sessions, remotely execute code on the VPN device, intercept encrypted traffic and read sensitive data.

Those activities are largely designed to give the bad actor a stronger foothold in a victim’s environment, which could result in a much larger compromise of the organization.

The guidance calls for a comprehensive audit of any VPN provider and ensuring the products use industry standard tools and practices, as well as requesting a software bill of materials to understand exactly what is in the product.

In addition, organizations should work to harden the VPN against compromise by using cryptographic algorithms as specified by NIST and other organizations, securely configuring the VPN, using trusted sever certificates and more.

To reduce the VPN’s attack surface, organizations are urged to immediately apply patches and updates, especially for known vulnerabilities. Access to the VPN device should be restricted by port and protocol, and intrusion prevent systems, and firewalls should also be deployed. Network segmentation and logging should also be implemented, according to the document.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: CISA, NSA, VPN

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.