Joint document includes configuration recommendations for hardening VPNs, and recommendations on how to select the most secure ones.
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) today jointly released detailed recommendations for how to select a remote access virtual private network (VPN) product and provider as well as how to ensure it's configured properly security-wise.
VPNs increasingly have become a popular target of nation-state actors and cybercriminals who exploit vulnerabilities in the VPN software to gain a foothold in a targeted network.
NSA and CISA recommend only purchasing VPNs from "reputable vendors" that use strong authentication in their products and have historically patched any known vulnerabilities. They advise employing multi-factor authentication, regular and timely patching and updating, and disabling any features that are not specifically VPN-related.
Read the full guidelines, Selecting and Hardening Remote Access VPN Solutions, here.
About the Author(s)
You May Also Like
The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024