S 2.418 Drawing up a security policy for the use of VPNs

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Head of IT, Administrator, IT Security Officer

Suitable security policies must be established for the use of VPN components in government agencies and companies. These VPN-specific security policies must conform to the general security concept and the general security policies of the organisation. They must be checked regularly to ensure they are up to date and modified if necessary. The VPN-specific rules can be added to the existing guidelines or can be collected in a separate guideline. A VPN security policy should contain the following aspects, amongst other things:

The correct implementation of the security safeguards described in the VPN security policy should be checked regularly.

User guidelines for VPN usage

To prevent overloading users with too many details, it may make sense to create a separate VPN user guideline in the form of an instruction sheet, for example. In this case, the user guideline should contain short descriptions of the special aspects related to VPN usage, for example:

Users should be made aware that VPNs are only allowed to be established from suitable locations and only using the IT components allowed for this purpose by the organisation. Depending on where the VPN is used, unsuitable locations could include hotel foyers, hotel business centres, or means of public transportation, but IT systems administered by outsiders could also be unsuitable (see S 4.251 Working with external IT systems). It is also important to clearly describe how to handle security solutions on the clients. This includes, for example, rules stating that

In addition, the user guideline should contain information on which data may be used and transmitted in the VPN and which data may not. This especially includes how to handle classified information such as classified material. Users should be sensitised to VPN threats and be familiar with the contents and consequences of the VPN guideline.

Guidelines for administrators of a VPN

In addition, VPN-specific guidelines for administrators should be created which can be used as the basis for training the administrators. It should specify who is responsible for the administration of the various VPN components, which interfaces are available between the administrators responsible for operations, and when which information must flow between the persons in charge. It is common for one organisational unit to be responsible for the operation of the server components while a different organisational unit is responsible for supporting VPN clients or for identity and authorisation management. The VPN guidelines for administrators should also contain the essential, core aspects of the operation of a VPN infrastructure, for example:

All VPN users, both general users and administrators, should confirm with their signature that they have read the contents of the VPN security policy and will follow the instructions defined in the security policy. No one should be allowed to use the VPN without this written confirmation. The signed declarations should be kept in a suitable location, for example in the personnel file.

Review questions: