Link to home
Start Free TrialLog in
Avatar of Pau Lo
Pau Lo

asked on

VPN Infrastructure for risk assessment purposes

What are the general ‘components’ on both the user and network/server side in a typical VPN system, that need considering from both a security and administration perspective? I’m trying to document from a risk assessment perspective all the key components whereby availability and security are paramount and if either was compromised would take the whole system offline.
And if you look after your VPN system from both the user/network side, what are your general ‘day to day’ tasks for supporting and managing the system, or is it relatively painless and largely doesn’t need to much administrative effort?
Avatar of Kimputer
Kimputer

Most if not all VPNs are still subject to hammering and bruteforcing. If budget is available, having agents check the logs could be useful.
However, having MFA available for your VPN is still a better solution. That would saving pruning logs mostly.
ASKER CERTIFIED SOLUTION
Avatar of btan
btan

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial