Link to home
Create AccountLog in
Security

Security

--

Questions

--

Followers

Top Experts

Avatar of Tech Curious
Tech Curious

VPN vs jump box for vulnerability scanning & testing

I’ve got an employee WFH full time as vulnerability management specialist. 

 

Responsible for asset discovery and running vulnerability scans across multiple internal & external networks and some sort of PT

He got corporate managed laptop

I’m trying to decide the safest and most practical access model for him

 

Give him VPN access directly into the internal network so he can scan from his laptop using tools like Kali Linux, Nessus etc 

 

or

 

Have him VPN first, then jump into  bastion/jump host and run scans from there (scanner appliance or VM).

 

Would appreciate any suggestions

Zero AI Policy

We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.


Avatar of serialbandserialband🇺🇦

Going through VPN should be a little safer.  If you also segregated your network, then a jump box may be needed to gain additional access.  

 

If you're scanning the network, then it would be more easily done from an internal system.  Trying to run a scan from the remote laptop going through the VPN means all the network packets traverse the VPN.  If it's an intensive scan, then that VPN connection could get saturated and cause connection problems for other people using it.

 


It’s a different testing scenario coming from a vpn as the cpn is likely a firewall that could block things, and will also be coming from a different subnet. So if the point is to test the blast radius of an infected machine on the local network, you need to have a coal network machine jump box to test from. 


This question needs an answer!
Looks like this question is still being worked on. Think you can help?
Create your account and start contributing!
Create Account

Reward 1Reward 2Reward 3Reward 4Reward 5Reward 6

EARN REWARDS FOR ASKING, ANSWERING, AND MORE.

Earn free swag for participating on the platform.

Security

Security

--

Questions

--

Followers

Top Experts

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.