Security
--
Questions
--
Followers
Top Experts
I’ve got an employee WFH full time as vulnerability management specialist.
Responsible for asset discovery and running vulnerability scans across multiple internal & external networks and some sort of PT
He got corporate managed laptop
I’m trying to decide the safest and most practical access model for him
Give him VPN access directly into the internal network so he can scan from his laptop using tools like Kali Linux, Nessus etc
or
Have him VPN first, then jump into bastion/jump host and run scans from there (scanner appliance or VM).
Would appreciate any suggestions
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Going through VPN should be a little safer. If you also segregated your network, then a jump box may be needed to gain additional access.
If you're scanning the network, then it would be more easily done from an internal system. Trying to run a scan from the remote laptop going through the VPN means all the network packets traverse the VPN. If it's an intensive scan, then that VPN connection could get saturated and cause connection problems for other people using it.
It’s a different testing scenario coming from a vpn as the cpn is likely a firewall that could block things, and will also be coming from a different subnet. So if the point is to test the blast radius of an infected machine on the local network, you need to have a coal network machine jump box to test from.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Security
--
Questions
--
Followers
Top Experts
Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.
Create your account and start contributing!