S 2.420 Selecting a trusted VPN service provider

Initiation responsibility: Top Management

Implementation responsibility: IT Security Officer, Top Management

The stand-alone operation of a VPN often requires a high level of expert knowledge on the part of the administrator responsible. In addition to the VPN-specific settings, it is also necessary to take into consideration additional cryptographic aspects and to optimise the connection to public networks. Once the best possible settings have been selected, it is possible to protect the confidentiality and integrity of the data, but the settings cannot affect the availability. Failures in the public network the VPN gateway is connected to may still interrupt the flow of data between the locations connected using the VPN.

An alternative to "secure VPNs" administrated separately, includes "trusted VPNs". In a trusted VPN, an external service provider is contracted to ensure secure transmission of the information. The service provider can be obligated to protect the confidentiality, integrity, and availability of the information transmitted with the help of contractual agreements.

In the case of trusted VPNs, the information is generally transmitted using the dedicated lines of the provider (carrier network) instead of using a public network like the internet. Since the carrier network is under the control of the service provider, the provider is able to guarantee the protection of the information to a certain degree.

From the point of view of the customer, the service provider provides the customer with devices that are then connected to the LANs the customer wants to connect. Since the data from the service provider is not encrypted in many cases and the external service provider is responsible for all support, trusted VPNs should only be used for data requiring little protection and without the customer implementing any additional security mechanisms. Even in this case, though, it is still highly recommended for the customer to encrypt the data. Data with higher protection requirements must be encrypted before it is transmitted.

One major disadvantage of using trusted VPNs is the resulting high dependency on the service provider. Switching to another service provider often entails great time and expense.

A major advantage of trusted VPNs is that the corresponding service provider often has an international presence. In the international environment in particular, organisations are often only able to provide a limited number of qualified personnel and processes at every location for the operation of their own VPN.

When selecting a trusted VPN service provider and during the subsequent contract negotiations, the aspects described in S 2.252 Choice of a suitable outsourcing service provider and S 2.253 Contractual arrangements with the outsourcing service provider must be taken into account. The following aspects also need to be taken into account for the operation of a trusted VPN:

All services agreed to must be specified as clearly and concisely as possible in writing. The security of the trusted VPN must be checked regularly so that it remains a trusted network. The client of the service provider must possess the rights needed to monitor the services. The service provider should be informed of the results of the examinations performed by independent third parties. All organisations that perform examinations of the service provider (e.g. supervisory agencies) also need to be granted rights for the corresponding monitoring capabilities by the VPN service provider (for example the corresponding site access rights, rights to view the data, etc.).

Review questions: