NSA, CISA Issue Guidelines for Selecting and Securing VPNs
Joint document includes configuration recommendations for hardening VPNs, and recommendations on how to select the most secure ones.
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) today jointly released detailed recommendations for how to select a remote access virtual private network (VPN) product and provider as well as how to ensure it's configured properly security-wise.
VPNs increasingly have become a popular target of nation-state actors and cybercriminals who exploit vulnerabilities in the VPN software to gain a foothold in a targeted network.
NSA and CISA recommend only purchasing VPNs from "reputable vendors" that use strong authentication in their products and have historically patched any known vulnerabilities. They advise employing multi-factor authentication, regular and timely patching and updating, and disabling any features that are not specifically VPN-related.
Read the full guidelines, Selecting and Hardening Remote Access VPN Solutions, here.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024