← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 92/100

CISA enterprise VPN security guidance

On 13 March 2020 CISA released guidance for securing enterprise VPN infrastructure as remote work increased during the COVID-19 pandemic. The guidance addresses critical vulnerabilities, authentication requirements, and capacity planning for organizations scaling remote access.

Reviewed for accuracy by Kodi C.

Cybersecurity pillar illustration for Zeph Tech briefings
Cybersecurity threat, control, and response briefings

On , as organizations rapidly shifted to remote work due to COVID-19, CISA released enterprise VPN security guidance addressing the heightened risk to remote access infrastructure. The guidance addresses VPN patching, authentication requirements, and capacity planning, recognizing that VPN concentrators become single points of failure when remote access scales dramatically. This alert represented one of CISA's first COVID-19-related cybersecurity advisories as the pandemic transformed enterprise IT landscapes.

Critical VPN Vulnerability environment

CISA emphasized immediate patching of known VPN vulnerabilities that had been actively exploited throughout 2019-2020. CVE-2019-19781 (Citrix ADC/Gateway) allowed unauthenticated remote code execution and was being actively exploited by multiple threat actors including nation-state groups. CVE-2019-11510 (Pulse Secure) enabled arbitrary file reading and credential theft, with attackers harvesting VPN credentials en masse. CVE-2018-13379 (Fortinet FortiOS) exposed user credentials through path traversal attacks.

These vulnerabilities had been used to establish initial access in numerous breaches, providing attackers with authenticated entry points to corporate networks. Security researchers observed extensive scanning for vulnerable VPN appliances, with exploitation often occurring within hours of public disclosure. The combination of critical severity, wide deployment, and active exploitation made these the highest-priority patches for remote access infrastructure.

If you are affected, treat VPN infrastructure as internet-facing critical assets requiring aggressive patch management. Establish processes for emergency patching outside regular maintenance windows when critical vulnerabilities are disclosed. Monitor vendor security advisories, subscribe to CISA alerts, and participate in information sharing organizations for early vulnerability notification.

Authentication and Identity Security

Implement multi-factor authentication (MFA) for all VPN connections without exception. Without MFA, stolen or phished credentials provide attackers with authenticated access to corporate networks. The pandemic's disruption created ideal conditions for phishing campaigns targeting remote workers, making credential theft a primary concern for organizations transitioning to remote access.

Consider certificate-based authentication for managed devices in addition to user MFA. Device certificates provide an additional authentication factor that attackers cannot easily replicate, even with stolen user credentials. Integration with mobile device management (MDM) or endpoint management platforms enables automated certificate provisioning and revocation.

Implement just-in-time access provisioning rather than standing VPN access for all employees. Users should request access when needed, with automatic expiration after defined periods. This approach reduces the window of opportunity for compromised credentials and provides audit trails of access requests.

Review and restrict VPN access to necessary users and services. The rapid shift to remote work often resulted in overly permissive VPN configurations as IT teams focus ond connectivity over security. Conduct access reviews to identify and remove unnecessary permissions, and implement role-based access controls that limit network segments accessible through VPN based on job function.

Network Architecture and Traffic Management

Implement split tunneling carefully, balancing security requirements with capacity constraints. Full tunnel configurations route all traffic through the VPN, providing complete visibility and control but consuming significant bandwidth. Split tunneling routes only corporate traffic through VPN while allowing direct internet access for personal browsing and cloud services.

Security implications of split tunneling include reduced visibility into user activity, potential for malware on user devices to communicate directly with command-and-control infrastructure, and reduced protection from endpoint compromise. However, full tunneling may be impractical for organizations whose VPN infrastructure cannot handle full traffic loads from dramatically increased remote workers.

Organizations adopting split tunneling should implement compensating controls including endpoint protection platforms with cloud-based management, DNS-level filtering for remote devices, and cloud access security brokers (CASBs) for monitoring sanctioned cloud application usage. These controls maintain security visibility without routing all traffic through centralized infrastructure.

Capacity Planning and Resilience

The rapid shift to remote work strained VPN capacity at many organizations, with some reporting 10x or greater increases in concurrent VPN users. CISA recommended assessing capacity requirements based on expected concurrent users, increasing bandwidth allocations, connection limits, and hardware resources. If you are affected, stress test VPN infrastructure under expected peak load conditions.

Implement load balancing across multiple VPN concentrators to distribute connection load and provide failover capability. Geographic distribution of VPN endpoints can improve performance for distributed workforces while providing resilience against localized outages. Monitor VPN performance metrics including connection counts, bandwidth use, and latency to identify capacity constraints before they cause service disruptions.

Consider alternative remote access technologies to complement or replace traditional VPN. Zero trust network access (ZTNA) solutions provide application-level access rather than network-level connectivity, reducing attack surface and enabling more granular access controls. Cloud-based secure access service edge (SASE) platforms distribute security functions across global points of presence, reducing dependence on centralized infrastructure.

Logging, Monitoring, and Incident Response

Log all VPN authentication events and monitor for anomalous access patterns. Key indicators include unusual login hours inconsistent with user work patterns, geographic anomalies suggesting credential theft or account takeover, concurrent sessions from different locations, and failed authentication attempts preceding successful access.

Integrate VPN logs with security information and event management (SIEM) platforms for correlation with other security telemetry. Establish baseline user behavior profiles to detect deviations that may show compromise. Implement automated alerting for high-risk patterns with defined escalation and response procedures.

Develop incident response playbooks specific to VPN compromise scenarios. Response procedures should address credential revocation, session termination, forensic evidence collection from VPN logs, and network containment to limit lateral movement from compromised VPN sessions. The criticality of VPN infrastructure during remote work periods makes rapid incident response essential for business continuity.

Operational Security and Maintenance

The guidance addressed update planning for high-availability VPN deployments, where patching one node at a time maintains connectivity. Establish testing procedures to validate patches before production deployment, but balance testing thoroughness against the urgency of critical security updates. Emergency patching procedures should enable rapid deployment with rollback capabilities.

The pandemic highlighted the importance of remote access infrastructure resilience in business continuity planning. If you are affected, document VPN infrastructure dependencies, identify single points of failure, and develop contingency plans for VPN outages. Consider diverse connectivity options including secondary VPN providers or alternative access methods for critical operations.

Regularly audit VPN configurations against security baselines and vendor hardening guides. Configuration drift over time can introduce vulnerabilities, particularly when changes are made rapidly during crisis response. Automated configuration management tools can enforce security standards and detect unauthorized modifications.

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Cybersecurity
Source credibility
92/100 — high confidence
Topics
VPN security · remote access · CISA guidance · COVID-19 · authentication · zero trust
Sources cited
3 sources (cisa.gov, csrc.nist.gov)
Reading time
5 min

References

  1. Enterprise VPN Security — CISA
  2. CISA Alert AA20-073A: Enterprise VPN Security — CISA
  3. NIST SP 800-77 Rev. 1: Guide to IPsec VPNs — NIST
  • VPN security
  • remote access
  • CISA guidance
  • COVID-19
  • authentication
  • zero trust
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.