Security and Speed Matter: Why the U.S. Government and Microsoft are Sounding the Alarm about VPNs

Security and Speed Matter: Why the U.S. Government and Microsoft are Sounding the Alarm about VPNs

The Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. Department of Homeland Security recently took a huge leap forward in defining a secure work-from-home (WFH) experience for federal workers at the time it’s needed most. CISA’s leadership highlighted zero trust access in new guidelines for government agencies that are managing more teleworkers than ever before.

Federal News Network reports the guidelines are aimed at helping to, “relieve the latency of connecting back to agency networks through virtual private networks and to government cloud services, such as Office 365.” In other words, the government is trying to help agencies deliver a great and secure user experience during this COVID-19 pandemic with a new set of best practices.

The guidance delivers a stark and much-needed change to remote telework policy. It is the first time the government’s cybersecurity leaders have recommended a zero trust access approach as a way to securely connect remote users. Zero trust greatly reduces the attack surface by directly connecting an authorized person to a business application through a cloud service such as Zscaler Private Access (ZPA) without ever touching the network. Previous federal policy required connections to come back through the network, which significantly slowed the experience for the user and introduced enormous security risk.

A VPN Security Warning to Government and Healthcare

The new government guidance also delivers a reminder of the diligence required to overcome the cybersecurity dangers posed by VPNs. CISA sounded the alarm around VPN security just a few weeks ago as well, and Microsoft Security recently warned hospitals that use VPNs about an imminent risk of being targeted with ransomware attacks.

I can only plead with government and enterprise operators charged with managing VPNs to closely follow the guidance from these experts, but it all seems so unnecessary in a world that is moving to the cloud. It’s extensive advice from CISA on how to secure VPNs including the following: update software patches and security configurations of all VPNs, network infrastructure and all devices connecting into the system; ensure your SOC can swiftly monitor, detect, respond to and recover from attacks; implement multi-factor authentication; and test the system’s usage limitations so you know how to rate limit for priority users.

Just reading that list of recommendations would exhaust most of us. As a CIO, this means you need to ensure that every single device related to the VPN is updated and configured correctly at all times, and you will still have to tell some of your users that they get slower connections so the more ‘important people’ can be faster. Even Cisco has had to ration VPNs for its staff. No company is immune from the fallout of legacy technology.

You Can Work from Home with Speed and Security

It does not have to be this hard. It does not have to be this slow. It does not have to be this insecure. The ancient design of VPNs and legacy firewalls is part of why Zscaler was founded more than 10 years ago—to make it easy for any enterprise user, anywhere, to have fast, secure, reliable connections to the web and their applications hosted in the cloud and data center.

We live in an always-on world. Why would we power this world with technology that is sometimes on and rarely secure? Although I am bewildered by the continued widespread use of VPN technology when we are in a cloud era, I’m hopeful that the government’s acknowledgment of zero trust as a modern approach will mark the beginning of a new era of progress.

Andrew Robinson FREC

Chairman at Paradigm Group of Companies, Magician, Investor, Advisor, Developer & Dad, 5K+Placements Globally

4 年

Interesting article but having read the reports both the US Government and Microsoft aren’t specifically sounding the alarm about VPN’s. They are sounding the alarm around the security of the VPN and Zero Trust which is only the same as companies and government bodies would have to do in the physical network. Zero Trust reaches to everyone / thing accessing corporate resources, to every resource or application - no matter where it resides.

Alan Finden

Travel / Stage / Kilimanjaro

4 年

Are we really in the "Cloud Era"? Surely we are in the "Hybrid" era, where the vast majority of enterprises have a mixed estate of on premise, off premise and cloud born apps. Zero Trust reaches to everyone / thing accessing corporate resources, to every resource or application - no matter where it resides.

Jay Chaudhry I agree with you that to optimize and secure network traffic, leverage cloud security platforms. Just as important though is to practice zero trust security at the endpoints, network and data, coupled with policy-driven automation.

Robert Loeb, CISSP

Providing Guidance for Security & Compliance in the Cyber Environment.

4 年

Nicely done. The use of ZScaler allows Critical Infrastructure to operate within a secure environment, compensating for many of the vulnerabilities found in IoT and SCADA support systems. That’s smart.

回复

Jay Chaudhry?-Great work from Zscaler!

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了