Site icon LIFARS, a SecurityScorecard company

How to Keep Attackers Out of Your VPN – According to the Feds

How-to-Keep-Attackers-Out-of-Your-VPN---According-to-the-Feds

In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China, Russia, Iran, and North Korea. In part, this comes down to heightened international tensions between these countries and the U.S. However, it’s also driven by the reality of attempted and successful large-scale attacks by these entities against critical infrastructure, governmental structures, and companies/technologies that form part of the federal supply chain.

Colonial Pipeline, Solarwinds, or the Port of Houston are just some of the most recent high-profile examples of how these state-backed agents can threaten national interests in a single attack.

According to the NSA (National Security Agency) and CISA (Cybersecurity and Infrastructure Security Agency), unsecured VPNs are a critical weak point in many of these systems, and an attractive point of entry for attackers. In fact, an old VPN password was one of the key factors in the Colonial Pipeline hack while unpatched SSL-VPNs led to the credentials of over 87,000 Fortinet customers being stolen.

By gaining unauthorized access to VPNs, hackers can quickly spread laterally throughout “protected” parts of the network. Or establish ATP (Advanced Threat Prevention), entrenching themselves deeply within connected systems and lying-in wait for the most opportune moment to strike.

The irony is that VPNs are meant to provide secure connections for users to remotely connect to a corporate network. They are typically used to enable secure access to services such as email portals, collaboration tools, and sensitive document repositories under the protections of perimeter firewalls and gateways. With remote work on the rise, the role of VPNs is more important than ever.

 

LIFARs offers Gap Analysis testing as well as remediation guidance for your remote work cyber infrastructure – protecting remote workers and infrastructure from cyber-attacks.

 

According to an advisory published by the NSA and CISA, exploiting CVEs associated with VPNs can allow a malicious actor “to steal credentials, remotely execute code, weaken encrypted traffic’s cryptography, hijack encrypted traffic sessions and read sensitive data from the device.”

How can you secure your business VPNs?

To combat this threat, the NSA and CISA jointly issued guidance on Selecting and Hardening Remote Access VPNs on 28 September 2021. Part of this guidance is a Cybersecurity Information Sheet detailing factors to consider when choosing a virtual private network (VPN) and top configurations for deploying it securely.

The aim is to help all stakeholders, including leaders in the Department of Defense, National Security Systems and the Defense Industrial Base better understand the risks associated with VPNs and how to counteract them.

While you should study the entire sheet for an in-depth explanation, here are the key takeaways of how to select a secure VPN service:

You can refer to the National Information Assurance Partnership (NIAP) Product Compliant List (PCL) for validated VPNs.

The advisory asserts that, in general, the best approach to hardening a VPNs security is to reduce the total attack surface. In broad strokes, this can be achieved by following these three guidelines:

Of course, the document also re-emphasizes other common sense best practices and the importance of implementing proper security hygiene. This includes promptly patching any vulnerabilities or applying workarounds, restricting port/protocol access, or creating an allowlist, and deploying intrusion prevention systems, WAFs (Web Application Firewalls), and other dedicated security measures.

Exit mobile version