T 5.93 Permitting use of VPN components by third parties

If unauthorised persons are allowed to use the components of a virtual private network (VPN), which means the current authorisation concept is violated, then it is impossible to guarantee the security of the VPN any more (see also T 3.30 Unauthorised private use of telecommuting workstations). The following threats are posed in this case, especially to remote access VPNs:

It can never be ruled out that the IT systems located at a remote site will be used by people outside the organisation. Since such people also have physical access to the systems, it is possible that the systems have been manipulated. The security mechanisms could be bypassed in this manner.