About this program
Audit your VPN: who can connect, with what, from where, and what they can reach.
Risks addressed
- Critical Compromised credential gives full intranet access
- Medium Split-tunnel leaks internal traffic outbound
- High No device posture check before VPN access
Controls (6)
-
MFA enforced on VPN logins
CriticalMFA enforced on VPN logins
How to test + evidence
Testing procedure: Verify VPN auth flow enforces MFA via IdP or RADIUS-MFA.
Evidence to collect: VPN auth config + auth logs sample.
-
Device posture check before access
HighDevice posture check before access
How to test + evidence
Testing procedure: Endpoint must be company-managed (cert / agent) before VPN tunnel opens.
Evidence to collect: Posture-check policy.
-
Network access limited to need-to-know subnets
HighNetwork access limited to need-to-know subnets
How to test + evidence
Testing procedure: VPN clients restricted by group → subnet ACLs, not flat access.
Evidence to collect: ACL export by group.
-
Modern crypto only (no PPTP / L2TP)
HighModern crypto only (no PPTP / L2TP)
How to test + evidence
Testing procedure: TLS 1.2+ / IPsec IKEv2; old protocols disabled.
Evidence to collect: VPN config.
-
VPN logs streamed to SIEM
MediumVPN logs streamed to SIEM
How to test + evidence
Testing procedure: All auth + session events sent to SIEM.
Evidence to collect: SIEM source inventory.
-
Idle timeout + reconnection requires reauth
MediumIdle timeout + reconnection requires reauth
How to test + evidence
Testing procedure: Sessions disconnect after idle window; reconnect requires MFA again.
Evidence to collect: VPN policy export.