Csi - Selecting Hardening Remote Access VPNS 20210928
Csi - Selecting Hardening Remote Access VPNS 20210928
Security
Agency
Infrastructure
Security Agency
| Cybersecurity Information Sheet
Hardening the VPN against compromise by reducing the VPN server’s attack
surface through:
Active Exploitation
Multiple nation-state Advanced Persistent Threat (APT) actors have exploited public
Common Vulnerabilities and Exposures (CVEs) to compromise vulnerable VPN devices
[1], [2], [3]. In some cases, exploit code is freely available online. Exploitation of these
public CVEs can enable a malicious actor to perform:
Credential harvesting
Remote code execution of arbitrary code on the VPN device
These effects usually lead to further malicious access through the VPN, resulting in
large-scale compromise of the corporate network or identity infrastructure and
sometimes of separate services as well.
Active Hardening
Once the selected VPN solution is deployed, the following actions will further
harden the VPN against compromise.
Disable non-VPN-related functionality and advanced features that are more likely
to have vulnerabilities. Features such as web administration, Remote Desktop
Protocol, Secure Shell, and file sharing are convenient, but not necessary for the
operation of remote access VPNs.
Restrict management interface access via the VPN. Malicious cyber actors that
manage to compromise administrator credentials could try to authenticate into
management interfaces and maliciously perform privileged operations. Do not
allow VPN administrators to log into the management interface via the remote
access VPN; instead, restrict administrative access to dedicated internal
management networks. Investigate any attempts to use administrator credentials
to access the remote access VPN [18].
Works cited
[1] National Security Agency (2019), Mitigating Recent VPN Vulnerabilities. Available:
https://www.nsa.gov/cybersecurity-guidance
[2] National Cyber Security Center, Cybersecurity and Infrastructure Security Agency, Federal
Bureau of Investigation, and National Security Agency (2021), Advisory: Further TTPs associated
with SVR cyber actors. Available: https://www.ncsc.gov.uk/files/Advisory Further TTPs associated
with SVR cyber actors.pdf
[3] National Security Agency (2020), Chinese State-Sponsored Actors Exploit Publicly Known
Vulnerabilities. Available: https://www.nsa.gov/cybersecurity-guidance
[4] National Information Assurance Partnership (NIAP) (2021), NIAP Product Compliant List (PCL).
Available: https://www.niap-ccevs.org/Product/PCL.cfm
[5] National Institute of Standards and Technology (2021), Cryptographic Module Validation Program
CMVP. Available: https://csrc.nist.gov/projects/cryptographic-module-validation-program
[6] National Security Agency (2019), Transition to Multi-factor Authentication. Available:
https://www.nsa.gov/cybersecurity-guidance
[7] National Telecommunications and Information Administration (2021), Software Bill of Materials.
Available: https://www.ntia.gov/SBOM
[8] Committee on National Security Systems (CNSS) (2016), CNSS Policy 15. Available:
https://www.cnss.gov/CNSS/issuances/Policies.cfm
[9] National Security Agency (2020), Securing IPsec Virtual Private Networks. Available:
https://www.nsa.gov/cybersecurity-guidance
[10] National Security Agency (2020), Configuring IPsec Virtual Private Networks. Available:
https://www.nsa.gov/cybersecurity-guidance
[11] Corcoran, Jenkins, NSA (2021), Commercial National Security Algorithm (CNSA) Suite
Cryptography for Internet Protocol Security (IPsec). Available:
https://datatracker.ietf.org/doc/html/draft-corcoran-cnsa-ipsec-profile
[12] National Institute for Standards and Technology (2020), SP 800-77 Rev. 1: Guide to IPsec VPNs.
Available: https://csrc.nist.gov/publications/detail/sp/800-77/rev-1/final
[13] National Security Agency (2021), Eliminating Obsolete Transport Layer Security (TLS) Protocol
Configurations. Available: https://www.nsa.gov/cybersecurity-guidance
[14] Cooley, D, NSA (2021), Commercial National Security Algorithm (CNSA) Suite Profile for TLS
and DTLS 1.2 and 1.3. Available: https://datatracker.ietf.org/doc/html/draft-cooley-cnsa-dtls-tls-
profile
[15] National Institute for Standards and Technology (2020), SP 800-52 Rev. 2: Guidelines for the
Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Available:
https://csrc.nist.gov/publications/detail/sp/800-52/rev-2/final
[16] National Security Agency (2019), Update and Upgrade Software Immediately. Available:
https://www.nsa.gov/cybersecurity-guidance
[17] Cybersecurity and Infrastructure Security Agency (2020), Enterprise VPN Security. Available:
https://us-cert.cisa.gov/ncas/alerts/aa20-073a
[18] National Security Agency (2020), Performing Out-of-Band Network Management. Available:
https://www.nsa.gov/cybersecurity-guidance
[19] National Security Agency (2019), Segment Networks and Deploy Application-Aware Defenses.
Available: https://www.nsa.gov/cybersecurity-guidance
[20] National Security Agency (2021), Embracing a Zero Trust Security Model. Available:
https://www.nsa.gov/cybersecurity-guidance
[21] National Security Agency (2019), Continuously Hunt for Network Intrusions. Available:
https://www.nsa.gov/cybersecurity-guidance
Disclaimer of endorsement
The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference
herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not
constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be
used for advertising or product endorsement purposes.
Purpose
NSA and CISA developed this document in furtherance of their respective cybersecurity missions, including their responsibilities to
develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate
stakeholders.
Contact
Client Requirements / Inquiries: Cybersecurity Requirements Center, 410-854-4200, [email protected]
Media Inquiries / Press Desk:
NSA Media Relations, 443-634-0721, [email protected]
CISA Media Relations, 703-235-2010, [email protected]