SlideShare a Scribd company logo
1 of 4
Developing a VPN Policy and Enforcing
VPN Best Practices
Enterprise-Class Security Considerations
Develop virtual private network (VPN) usage and security
policies to the exact scale and scope of the network.
Ensure that only approved individuals and authorized third-
parties access and use the VPN service by performing the
following:
· Establish strong authentication mechanisms. For example,
token devices, private keys, or passphrases.
· Establish VPN usage restrictions, like who may use it and how
it may be used.
· Force VPN traffic through the VPN tunnel and drop all other
traffic.
· Enforce strong password selections and idle user logon
timeouts.
· Enforce strict VPN client usage and maintain updates on
mandatory security software (that is, antivirus.)
Remember to notify remote users that they are subject to the
company’s network rules and regulations. Develop a roadmap to
check, recheck, configure, update, and service VPN components
as per the schedule. VPN policies cover everything from
security practices to maintenance routines.
Define Users, Groups, and Access Rights
Ask important questions about who can use the VPN, how they
can use it, and what to track and record when they use it. Your
VPN policy should generally address every foreseeable usage
scenario, user behavior, and unauthorized activity. Start with
highpoints and drill down into the specifics. Define acceptable
behavior and develop procedures and processes for enforcing
compliance and handling violations. Some considerations are:
· The types of users and groups who may remotely access the
network:
· Employees who work from home and need to access the
company intranet.
· Server administrators who often need to update and make
changes on their server machines remotely.
· Branch office workers who need a secure connection to the
main office intranet.
· Off-site contractors working on a project with company
personnel.
· Servers, services, and systems that remote workers should be
able to access:
· VPN servers must be authorized by the network administrator.
· Administrators must restrict access to internal resources for
VPN users; for example, contractors have access only to
specific project folders.
· Permissible and impermissible user and group behaviors
· Policy should state that non-company related use of computers
with VPN clients is prohibited; the VPN user is responsible for
all activities that originate from his or her computer or logon
account.
· VPN users are responsible for the physical security of their
computers.
· VPN users are responsible for keeping anti-malware software
on their computers up to date.
· VPN users must follow all rules established for company
network access.
· VPN users must report any security incidents to the company
security department within a specific time period of detection.
· VPN users must create strong passwords and change them
every 90 days, when prompted.
· All VPN usage will be monitored and logged. Policy
violations by VPN users will be handled on a case-by-case
basis. Repeat violations may result in the suspension of access.
· Time-of-day restrictions or enforcement of idle user timeouts:
· Limit VPN usage to a specific range of hours, such as between
8 a.m. and 5 p.m.
· Configure the VPN server to disconnect connections that have
been idle for a period of time; such as 30 minutes, 1 hour, and
so on.
Policies, Standards, and Guidelines
Policies outline specific requirements that cover high-level
points, such as acceptable use policies that cover rules and
regulations for using systems and networks.
Standards comprise system-specific or procedural requirements
all users must practice when using the systems, services, and
networks.
Guidelines specify systematic or procedural suggestions that are
not strict requirements but instead best practices. Effective
policies are built on standards and guidelines applicable to the
organization.
Federal regulations and industry practices often factor into the
standards and guidelines upon which policies are built.
Governmental laws regulate how sensitive data is processed,
stored, and transmitted. Laws may mandate certain levels of
security and assurances that appropriate measures are taken to
safely handle sensitive information. Industry practices are built
on experience and best practices that are applicable to a
particular process or procedure.
Usability Concerns and Usage Models
VPN clients and servers must use compatible protocols and
software for connectivity. Network administrators must also
establish minimum and maximum thresholds for user tunnel
connections so that all users can access the VPN without
consuming all available bandwidth.
User reservation model (per concurrent user per tunnel):
Specific tunnel speeds (e.g., 56K, 128K, 256K, and 384K),
increments of concurrent users (i.e., 10 concurrent users at
1,000 concurrent maximum), same size tunnels within a given
domain.
Bandwidth reservation model (per user): Reserve bandwidth
among multiple users, 1Mbps increments up to a maximum
45Mbps per port, maximum 1,000 concurrent sessions per
instance, and maximum tunnel size with Transmission Control
Protocol (TCP) control flow rates as new users connect (tunnel
balancing).
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1

More Related Content

Similar to Developing a VPN Policy and EnforcingVPN Best PracticesEnt.docx

Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxrock73
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information SystemDr Jasbeer Singh
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicAlleneMcclendon878
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access policARIV4
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012AVEVA
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxdanhaley45372
 
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...null - The Open Security Community
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkVINAY GATLA
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheetguest3f034b
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security PoliciesAamir Sohail
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_usersCristian Garcia G.
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategykatharine300
 
Scenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docxScenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docxtodd331
 
Mastering Network Security A pOrbis Guide to Safeguard Your Business.pptx
Mastering Network Security A pOrbis Guide to Safeguard Your Business.pptxMastering Network Security A pOrbis Guide to Safeguard Your Business.pptx
Mastering Network Security A pOrbis Guide to Safeguard Your Business.pptxpOrbis
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91Shanmugavel Sankaran
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 

Similar to Developing a VPN Policy and EnforcingVPN Best PracticesEnt.docx (20)

Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheet
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategy
 
Scenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docxScenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docx
 
Mastering Network Security A pOrbis Guide to Safeguard Your Business.pptx
Mastering Network Security A pOrbis Guide to Safeguard Your Business.pptxMastering Network Security A pOrbis Guide to Safeguard Your Business.pptx
Mastering Network Security A pOrbis Guide to Safeguard Your Business.pptx
 
2010fall ch31 naymka
2010fall ch31 naymka2010fall ch31 naymka
2010fall ch31 naymka
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
whats-new_Fireware_v11-10
whats-new_Fireware_v11-10whats-new_Fireware_v11-10
whats-new_Fireware_v11-10
 

More from lynettearnold46882

Assignment User FrustrationThe quality of the user experience i.docx
Assignment User FrustrationThe quality of the user experience i.docxAssignment User FrustrationThe quality of the user experience i.docx
Assignment User FrustrationThe quality of the user experience i.docxlynettearnold46882
 
Assignment Upstream Approaches to Canadian Population HealthAlt.docx
Assignment Upstream Approaches to Canadian Population HealthAlt.docxAssignment Upstream Approaches to Canadian Population HealthAlt.docx
Assignment Upstream Approaches to Canadian Population HealthAlt.docxlynettearnold46882
 
Assignment Type up an essay on one of two prompts and submit the .docx
Assignment Type up an essay on one of two prompts and submit the .docxAssignment Type up an essay on one of two prompts and submit the .docx
Assignment Type up an essay on one of two prompts and submit the .docxlynettearnold46882
 
Assignment TypeIndividual ProjectDeliverable Length8–10 slid.docx
Assignment TypeIndividual ProjectDeliverable Length8–10 slid.docxAssignment TypeIndividual ProjectDeliverable Length8–10 slid.docx
Assignment TypeIndividual ProjectDeliverable Length8–10 slid.docxlynettearnold46882
 
Assignment Type Individual discussion Board;   450 – 550 word.docx
Assignment Type Individual discussion Board;   450 – 550 word.docxAssignment Type Individual discussion Board;   450 – 550 word.docx
Assignment Type Individual discussion Board;   450 – 550 word.docxlynettearnold46882
 
Assignment Two UNIT 2Student Name _______________________.docx
Assignment Two UNIT 2Student Name _______________________.docxAssignment Two UNIT 2Student Name _______________________.docx
Assignment Two UNIT 2Student Name _______________________.docxlynettearnold46882
 
Assignment Two Select a college or university and provide th.docx
Assignment Two Select a college or university and provide th.docxAssignment Two Select a college or university and provide th.docx
Assignment Two Select a college or university and provide th.docxlynettearnold46882
 
Assignment Two Objectives • Understand how the.docx
Assignment Two   Objectives • Understand how the.docxAssignment Two   Objectives • Understand how the.docx
Assignment Two Objectives • Understand how the.docxlynettearnold46882
 
Assignment Topic Exploration and Analysis (Proposal)In Week 6 o.docx
Assignment Topic Exploration and Analysis (Proposal)In Week 6 o.docxAssignment Topic Exploration and Analysis (Proposal)In Week 6 o.docx
Assignment Topic Exploration and Analysis (Proposal)In Week 6 o.docxlynettearnold46882
 
Assignment To consider three sources about the Fall of Rome and w.docx
Assignment To consider three sources about the Fall of Rome and w.docxAssignment To consider three sources about the Fall of Rome and w.docx
Assignment To consider three sources about the Fall of Rome and w.docxlynettearnold46882
 
Assignment topic Rapid Influenza Testing in Children and Adult.docx
Assignment topic  Rapid Influenza Testing in Children and Adult.docxAssignment topic  Rapid Influenza Testing in Children and Adult.docx
Assignment topic Rapid Influenza Testing in Children and Adult.docxlynettearnold46882
 
Assignment Topic 1Choose a contemporary painting, sculpture, o.docx
Assignment Topic 1Choose a contemporary painting, sculpture, o.docxAssignment Topic 1Choose a contemporary painting, sculpture, o.docx
Assignment Topic 1Choose a contemporary painting, sculpture, o.docxlynettearnold46882
 
Assignment TitleAssessment Item 03 Case Study Analysis – Engagi.docx
Assignment TitleAssessment Item 03 Case Study Analysis – Engagi.docxAssignment TitleAssessment Item 03 Case Study Analysis – Engagi.docx
Assignment TitleAssessment Item 03 Case Study Analysis – Engagi.docxlynettearnold46882
 
Assignment Title Knowledge management cycle process in or.docx
Assignment Title Knowledge management cycle process in or.docxAssignment Title Knowledge management cycle process in or.docx
Assignment Title Knowledge management cycle process in or.docxlynettearnold46882
 
Assignment Three Technical Descriptions Due March 2 (1155 PM .docx
Assignment Three Technical Descriptions Due March 2 (1155 PM .docxAssignment Three Technical Descriptions Due March 2 (1155 PM .docx
Assignment Three Technical Descriptions Due March 2 (1155 PM .docxlynettearnold46882
 
Assignment ThreeUNIT 3 – ON LINE CLASSStudent Name __________.docx
Assignment ThreeUNIT 3 – ON LINE CLASSStudent Name __________.docxAssignment ThreeUNIT 3 – ON LINE CLASSStudent Name __________.docx
Assignment ThreeUNIT 3 – ON LINE CLASSStudent Name __________.docxlynettearnold46882
 
Assignment title An Evaluation of the Business Strategy at Mc D.docx
Assignment title An Evaluation of the Business Strategy at Mc D.docxAssignment title An Evaluation of the Business Strategy at Mc D.docx
Assignment title An Evaluation of the Business Strategy at Mc D.docxlynettearnold46882
 
ASSIGNMENT The student will submit a research project that compares.docx
ASSIGNMENT The student will submit a research project that compares.docxASSIGNMENT The student will submit a research project that compares.docx
ASSIGNMENT The student will submit a research project that compares.docxlynettearnold46882
 
Assignment Three Case study report – mixed mediaValue 40 .docx
Assignment Three Case study report – mixed mediaValue 40 .docxAssignment Three Case study report – mixed mediaValue 40 .docx
Assignment Three Case study report – mixed mediaValue 40 .docxlynettearnold46882
 
Assignment The Nurse Leader as Knowledge WorkerThe term kn.docx
Assignment The Nurse Leader as Knowledge WorkerThe term kn.docxAssignment The Nurse Leader as Knowledge WorkerThe term kn.docx
Assignment The Nurse Leader as Knowledge WorkerThe term kn.docxlynettearnold46882
 

More from lynettearnold46882 (20)

Assignment User FrustrationThe quality of the user experience i.docx
Assignment User FrustrationThe quality of the user experience i.docxAssignment User FrustrationThe quality of the user experience i.docx
Assignment User FrustrationThe quality of the user experience i.docx
 
Assignment Upstream Approaches to Canadian Population HealthAlt.docx
Assignment Upstream Approaches to Canadian Population HealthAlt.docxAssignment Upstream Approaches to Canadian Population HealthAlt.docx
Assignment Upstream Approaches to Canadian Population HealthAlt.docx
 
Assignment Type up an essay on one of two prompts and submit the .docx
Assignment Type up an essay on one of two prompts and submit the .docxAssignment Type up an essay on one of two prompts and submit the .docx
Assignment Type up an essay on one of two prompts and submit the .docx
 
Assignment TypeIndividual ProjectDeliverable Length8–10 slid.docx
Assignment TypeIndividual ProjectDeliverable Length8–10 slid.docxAssignment TypeIndividual ProjectDeliverable Length8–10 slid.docx
Assignment TypeIndividual ProjectDeliverable Length8–10 slid.docx
 
Assignment Type Individual discussion Board;   450 – 550 word.docx
Assignment Type Individual discussion Board;   450 – 550 word.docxAssignment Type Individual discussion Board;   450 – 550 word.docx
Assignment Type Individual discussion Board;   450 – 550 word.docx
 
Assignment Two UNIT 2Student Name _______________________.docx
Assignment Two UNIT 2Student Name _______________________.docxAssignment Two UNIT 2Student Name _______________________.docx
Assignment Two UNIT 2Student Name _______________________.docx
 
Assignment Two Select a college or university and provide th.docx
Assignment Two Select a college or university and provide th.docxAssignment Two Select a college or university and provide th.docx
Assignment Two Select a college or university and provide th.docx
 
Assignment Two Objectives • Understand how the.docx
Assignment Two   Objectives • Understand how the.docxAssignment Two   Objectives • Understand how the.docx
Assignment Two Objectives • Understand how the.docx
 
Assignment Topic Exploration and Analysis (Proposal)In Week 6 o.docx
Assignment Topic Exploration and Analysis (Proposal)In Week 6 o.docxAssignment Topic Exploration and Analysis (Proposal)In Week 6 o.docx
Assignment Topic Exploration and Analysis (Proposal)In Week 6 o.docx
 
Assignment To consider three sources about the Fall of Rome and w.docx
Assignment To consider three sources about the Fall of Rome and w.docxAssignment To consider three sources about the Fall of Rome and w.docx
Assignment To consider three sources about the Fall of Rome and w.docx
 
Assignment topic Rapid Influenza Testing in Children and Adult.docx
Assignment topic  Rapid Influenza Testing in Children and Adult.docxAssignment topic  Rapid Influenza Testing in Children and Adult.docx
Assignment topic Rapid Influenza Testing in Children and Adult.docx
 
Assignment Topic 1Choose a contemporary painting, sculpture, o.docx
Assignment Topic 1Choose a contemporary painting, sculpture, o.docxAssignment Topic 1Choose a contemporary painting, sculpture, o.docx
Assignment Topic 1Choose a contemporary painting, sculpture, o.docx
 
Assignment TitleAssessment Item 03 Case Study Analysis – Engagi.docx
Assignment TitleAssessment Item 03 Case Study Analysis – Engagi.docxAssignment TitleAssessment Item 03 Case Study Analysis – Engagi.docx
Assignment TitleAssessment Item 03 Case Study Analysis – Engagi.docx
 
Assignment Title Knowledge management cycle process in or.docx
Assignment Title Knowledge management cycle process in or.docxAssignment Title Knowledge management cycle process in or.docx
Assignment Title Knowledge management cycle process in or.docx
 
Assignment Three Technical Descriptions Due March 2 (1155 PM .docx
Assignment Three Technical Descriptions Due March 2 (1155 PM .docxAssignment Three Technical Descriptions Due March 2 (1155 PM .docx
Assignment Three Technical Descriptions Due March 2 (1155 PM .docx
 
Assignment ThreeUNIT 3 – ON LINE CLASSStudent Name __________.docx
Assignment ThreeUNIT 3 – ON LINE CLASSStudent Name __________.docxAssignment ThreeUNIT 3 – ON LINE CLASSStudent Name __________.docx
Assignment ThreeUNIT 3 – ON LINE CLASSStudent Name __________.docx
 
Assignment title An Evaluation of the Business Strategy at Mc D.docx
Assignment title An Evaluation of the Business Strategy at Mc D.docxAssignment title An Evaluation of the Business Strategy at Mc D.docx
Assignment title An Evaluation of the Business Strategy at Mc D.docx
 
ASSIGNMENT The student will submit a research project that compares.docx
ASSIGNMENT The student will submit a research project that compares.docxASSIGNMENT The student will submit a research project that compares.docx
ASSIGNMENT The student will submit a research project that compares.docx
 
Assignment Three Case study report – mixed mediaValue 40 .docx
Assignment Three Case study report – mixed mediaValue 40 .docxAssignment Three Case study report – mixed mediaValue 40 .docx
Assignment Three Case study report – mixed mediaValue 40 .docx
 
Assignment The Nurse Leader as Knowledge WorkerThe term kn.docx
Assignment The Nurse Leader as Knowledge WorkerThe term kn.docxAssignment The Nurse Leader as Knowledge WorkerThe term kn.docx
Assignment The Nurse Leader as Knowledge WorkerThe term kn.docx
 

Recently uploaded

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Developing a VPN Policy and EnforcingVPN Best PracticesEnt.docx

  • 1. Developing a VPN Policy and Enforcing VPN Best Practices Enterprise-Class Security Considerations Develop virtual private network (VPN) usage and security policies to the exact scale and scope of the network. Ensure that only approved individuals and authorized third- parties access and use the VPN service by performing the following: · Establish strong authentication mechanisms. For example, token devices, private keys, or passphrases. · Establish VPN usage restrictions, like who may use it and how it may be used. · Force VPN traffic through the VPN tunnel and drop all other traffic. · Enforce strong password selections and idle user logon timeouts. · Enforce strict VPN client usage and maintain updates on mandatory security software (that is, antivirus.) Remember to notify remote users that they are subject to the company’s network rules and regulations. Develop a roadmap to check, recheck, configure, update, and service VPN components as per the schedule. VPN policies cover everything from security practices to maintenance routines. Define Users, Groups, and Access Rights Ask important questions about who can use the VPN, how they can use it, and what to track and record when they use it. Your VPN policy should generally address every foreseeable usage scenario, user behavior, and unauthorized activity. Start with highpoints and drill down into the specifics. Define acceptable
  • 2. behavior and develop procedures and processes for enforcing compliance and handling violations. Some considerations are: · The types of users and groups who may remotely access the network: · Employees who work from home and need to access the company intranet. · Server administrators who often need to update and make changes on their server machines remotely. · Branch office workers who need a secure connection to the main office intranet. · Off-site contractors working on a project with company personnel. · Servers, services, and systems that remote workers should be able to access: · VPN servers must be authorized by the network administrator. · Administrators must restrict access to internal resources for VPN users; for example, contractors have access only to specific project folders. · Permissible and impermissible user and group behaviors · Policy should state that non-company related use of computers with VPN clients is prohibited; the VPN user is responsible for all activities that originate from his or her computer or logon account. · VPN users are responsible for the physical security of their computers. · VPN users are responsible for keeping anti-malware software on their computers up to date. · VPN users must follow all rules established for company network access. · VPN users must report any security incidents to the company security department within a specific time period of detection. · VPN users must create strong passwords and change them every 90 days, when prompted. · All VPN usage will be monitored and logged. Policy violations by VPN users will be handled on a case-by-case basis. Repeat violations may result in the suspension of access.
  • 3. · Time-of-day restrictions or enforcement of idle user timeouts: · Limit VPN usage to a specific range of hours, such as between 8 a.m. and 5 p.m. · Configure the VPN server to disconnect connections that have been idle for a period of time; such as 30 minutes, 1 hour, and so on. Policies, Standards, and Guidelines Policies outline specific requirements that cover high-level points, such as acceptable use policies that cover rules and regulations for using systems and networks. Standards comprise system-specific or procedural requirements all users must practice when using the systems, services, and networks. Guidelines specify systematic or procedural suggestions that are not strict requirements but instead best practices. Effective policies are built on standards and guidelines applicable to the organization. Federal regulations and industry practices often factor into the standards and guidelines upon which policies are built. Governmental laws regulate how sensitive data is processed, stored, and transmitted. Laws may mandate certain levels of security and assurances that appropriate measures are taken to safely handle sensitive information. Industry practices are built on experience and best practices that are applicable to a particular process or procedure. Usability Concerns and Usage Models VPN clients and servers must use compatible protocols and software for connectivity. Network administrators must also establish minimum and maximum thresholds for user tunnel connections so that all users can access the VPN without
  • 4. consuming all available bandwidth. User reservation model (per concurrent user per tunnel): Specific tunnel speeds (e.g., 56K, 128K, 256K, and 384K), increments of concurrent users (i.e., 10 concurrent users at 1,000 concurrent maximum), same size tunnels within a given domain. Bandwidth reservation model (per user): Reserve bandwidth among multiple users, 1Mbps increments up to a maximum 45Mbps per port, maximum 1,000 concurrent sessions per instance, and maximum tunnel size with Transmission Control Protocol (TCP) control flow rates as new users connect (tunnel balancing). © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1