Cybersecurity is inherently complex. It involves hardware and software, as well as the most complicated component — actual human beings. Sometimes, though, the simplest measures can make a significant difference.
That’s the case with VPN (virtual private network) hardening.
Remote access VPN solutions were already popular with businesses of all sizes when COVID-19 hit. They make it easy for employees to securely access the company network to get the data and applications they need to do their jobs when they’re not in the office. COVID-related measures created a large population of remote employees working on home or public WiFi, and VPNs were key to maintaining productivity and business operations by enabling secure traffic sessions.
Beyond securely connecting users to a company’s internal network, and the resources that reside within that network, a VPN solution is key to maintaining the three underlying information security principles of confidentiality, integrity, and availability:
One thing to note: this article focuses on the OpenVPN tunneling protocol, not Internet Protocol Security (IPSec), Layer 2 Tunneling Protocol (L2TP), Point–to–Point Tunneling Protocol (PPTP), Secure Sockets Layer (SSL) and Transport Layer Security (TLS), or Secure Shell (SSH).
The OpenVPN focus is due to the fact that when you look under the hood of a lot of VPNs, they've built their products on the OpenVPN open source code. It's the VPN protocol standard. But as we've seen with some recent vulnerabilities, these providers still need to be smart with their implementations. If they don't plan for security, they implement solutions with dangerous back doors. The same thing goes for how you set up your VPN for your business. While our business VPN products, OpenVPN Cloud and OpenVPN Access Server, provide strong security and encryption, the way you implement the solution in your environment can open you up to vulnerabilities. While we try to set things up securely by default, there may be factors in your environment that could introduce an issue. It's important to follow best practices.
Thankfully, with the right tools, network administrators can deliver availability to remote workers, keep the company network strong, and stop bad actors attempting ransomware, DNS hijacking, or any number of other cyberattacks.
When employees work remotely — from home, a hotel, or any number of other locations — they send company information back and forth from their mobile devices. The convenience is great, but hackers and cybercriminals are eager to get their hands on that information. But if employees are tapping into the corporate network using a VPN connection, their internet activity is encrypted and hidden from cybercriminals, and their IP address can be concealed behind the IP address of the VPN server.
But simply having it there isn’t enough. A VPN, or any other network security measure, isn’t a set-it-and-forget-it proposition. VPNs need to be continually checked for updates and gaps, just like any other devices or programs that face the internet. And of course employees need to be reminded of the importance of using them. That’s what VPN hardening is: auditing the most basic elements of a company’s VPN to confirm they’re operating correctly and effectively. If an audit reveals vulnerabilities, defenses must be reinforced. Even better, make sure your VPN offers more than just encryption — the more security measures you have, the stronger your network will be.
Hardening VPN devices is the first step in an overall hardening plan. To do this, administrators should:
OpenVPN Access Server users can take a variety of steps to harden their security. We have a more extensive guide here, but the overview of that is:
Finally, one of the best things about OpenVPN is its open source origins. That means OpenVPN products have an extraordinary amount of support information provided by a security community that’s continuously looking for security risks and ways to mitigate them. The OpenVPN Support Forum includes discussions for a number of projects and solutions, including Microsoft Windows, macOS, Android, iOS, and Linux, as well as OpenVPN Connect, our VPN client software.
Good to Know: The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released this joint Cybersecurity Information Sheet in September. It outlines considerations for choosing a VPN and recommendations for deploying it securely. Download the report to learn more about hardening a VPN by reducing the VPN server’s attack surface by:
Working remotely, either all or some of the time, is here to stay. The ability to work anywhere an internet connection is available provides benefits to both employees and employers, but it also requires paying extra attention to potential security issues. VPN hardening is a critical component of network security that guards a company’s resources and maintains necessary functionality for users.