S 2.419 Selection of suitable VPN products

Initiation responsibility: Top Management

Implementation responsibility: IT Security Officer, Top Management

Companies and government agencies place a wide variety of different requirements on networks, for example that the network is required to connect different locations or connect mobile employees or telecommuters to the internal network. The requirements between different organisations vary correspondingly and must be taken into consideration when selecting VPN products. The results of safeguards S 3.65 Introduction to basic VPN terminology and S 2.416 Planning the use of VPNs must also be considered.

VPN products differ in terms of their scope of functions, security mechanisms offered, ease of use, and efficiency. In addition, they place different requirements on hardware and software components in the operational environment.

Before purchasing a VPN product, a list of requirements should be developed to help assess the products available on the market. A sound purchase decision can then be made based on the assessment.

If a service provider is contracted to provide a VPN, it is generally impossible to influence the way the products operated by the service provider are selected. Information on how to select VPN service providers can be found in S 2.420 Selecting a trusted VPN service provider.

A VPN usually consists of a combination of several hardware and software components. The components can be roughly categorised into two types of components: LAN components and client components. The specific components to be purchased depend on the VPN system architecture selected. In large organisations, several VPN connections are operated simultaneously for different purposes. Special IT systems (hardware and software) which have been specifically designed to be used as a VPN server are generally needed to achieve this.

Various manufacturers offer VPN components in the form of appliances. Appliances are preconfigured devices that are manufactured and configured for only one specific purpose (in this case: as VPN endpoints). Appliances often offer the advantage of simpler configuration in comparison to building a central VPN component from standard IT components that need to be configured accordingly (by the organisation itself or by a service provider). On the other hand, most of them have the disadvantage that the configuration is less flexible and there is less scope for tailoring to individual requirements.

The following basic security functions must be fulfilled when selecting VPN products:

The following list provides an overview of possible general evaluation criteria, but it is by no means complete and additional general requirements can be added to it. In addition to the criteria listed in the overview, it is also necessary to develop other specific requirements resulting from the actual operational scenarios planned (see safeguard S 2.415 Performing a VPN requirements analysis).

General criteria

Functions

Once all requirements on the product to be purchased have been documented, it is necessary to examine the products available on the market to determine the extent to which they fulfil these requirements. You cannot expect every product to fulfil all requirements at the same time or with the same quality. For this reason, the individual requirements should be weighted according to their relevance to the organisation. Similarly, it is also possible to divide the degree of fulfilment of a requirement by the particular product into several different levels. The product evaluation performed can then be used as the basis for making a sound purchase decision.

It is necessary to check before installation if the selected products actually meet the requirements adequately and are compatible with the technologies the organisation plans to use. The selection of the VPN devices is one of the most important aspects for the smooth operation of a VPN. It is therefore necessary to consider this decision carefully, because changes made later often result in high costs or the changes may even have a negative impact on security.

Review questions: