S 6.109 Business continuity plan for the failure of a VPN

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

The failure of a VPN could have serious consequences depending on the availability requirements. In order to avoid damage and/or to minimise the resulting damage, the availability requirements determined while defining the VPN system architecture must be taken into consideration. A VPN business continuity concept is used as a guide for an acute damage event (e.g. physical destruction, unauthorised access) and is intended to help the organisation maintain an overview of the safeguards to be taken in an emergency.

Contingency planning for VPNs must be integrated into the existing business continuity management system (see also module S 1.3 Business continuity management). Procedures and definitions of initial measures must be defined for a quick transition to normal operations.

Individual VPN business continuity concepts must be drawn up which reflect the specific conditions in the organisation based on the prioritisation of the locations, business processes, and/or organisational units. The following aspects must be taken into consideration when drawing up a business continuity concept for a VPN:

Suitable procedures should be developed for individual damage scenarios in the form of business continuity documentation. This documentation should contain all data needed to handle and overcome an emergency and presented in such a way that even substitutes are able to work with it. The business continuity documentation should also contain information on alternative connection routes, for example on alternative telecommunications providers or alternative transmission media.

People responsible in an emergency

Key personnel positions must be defined and documented together with their tasks and authorities. The recommendations provided in safeguard S 6.59 Specification of responsibilities for dealing with security incidents also must be taken into consideration in this case.

Setting up emergency numbers

An emergency number should be offered for employees, and especially for the mobile employees and telecommuters, so that they can report VPN problems promptly to the persons in charge. In addition, the VPN should be permanently monitored during critical periods (during office hours or times in which data is primarily exchanged via VPN, for example).

Redundant communication links

Increased requirements for the availability may arise depending on the priorities of the locations and their business-critical applications. If the availability requirements are high, secondary connections should be available in case of an incident. The secondary connection is only used in case of an incident and can be implemented using a DSL or ISDN connection, for example. Safeguard S 6.18 Provision of redundant lines offers additional information on proper implementation.

Redundant VPN components

Depending on the availability requirements of the corresponding location, the failure of a VPN component could result in more or less serious problems. Corresponding redundancy must be available when high requirements are placed on the availability of the VPN. This redundancy can be implemented corresponding to the requirements using the following mechanisms, for example:

It should be examined whether a redundant design is necessary, especially for central VPN components such as the VPN server in the context of a remote access VPN, for example.

Information is generally transmitted in encrypted form in VPNs. For this reason, it is necessary to ensure that the corresponding replacement keys are available for encryption and/or new keys must be generated. This aspect must be taken into account in key management.

There are many possible sources of error in a VPN, and implementation of safeguard S 6.53 Redundant arrangement of network components can help to provide additional reliability.

Development of a post-incident recovery plan

A recovery plan must be developed for every VPN operated in order to guarantee the quickest possible recovery of operations. The steps necessary must be specified and documented in the recovery plan. To ensure smooth operations when replacing defective VPN components, there must be a current backup available of the corresponding configuration data. Safeguard S 6.52 Regular backup of configuration data of active network components contains more information in this regard. It is also necessary to guarantee data consistency when recovering operations (see S 1.4 Development of a data backup plan).

Checking data integrity after incidents

During a crash of one or several VPN components or when another incident occurs on the VPN, it may not always be possible to guarantee the consistency of the data transmitted using the VPN. For this reason, the integrity of this data should be checked and the problem analysed after every incident to keep the problems from repeating.

Business continuity configuration

It may be necessary in certain situations to operate the VPN with restricted functionality or performance. In this case, a corresponding business continuity configuration must be enabled (see also S 4.320 Secure configuration of a VPN). The business continuity configuration serves to maintain the security of the VPN (system access security, data access security, communication security) even when operations are limited. For this, it is necessary to specify which VPN business continuity configuration will be selected in which situations in advance depending on the priorities assigned to the locations, business processes, and/or organisational units.

Performance of emergency drills

The best recovery plan is useless if it is not feasible in practice. It is therefore particularly important to conduct regular emergency drills in order to recognise and improve any weaknesses (see also S 6.12 Emergency preparedness exercises). The availability of audit-proof logs of the VPN recovery process must be guaranteed. The operability of all replacement VPN components, data backup devices, backup data media, and secondary cables used for the alternative communication connections must be checked at regular intervals. The people responsible will benefit from the training and awareness-raising measures and will be able to react quickly and efficiently in the event of a real emergency.

The VPN business continuity concept must be adapted to reflect the specific situation in the organisation and be designed in such a way that critical business processes will be available again within the time required. The VPN business continuity concept must be written in such a way that it can be carried out by third party experts. The VPN business continuity concept must always be kept up to date based on consistent technical, organisational, and personnel changes.

Review questions: