For about two decades, security leaders were told over and over by many vendors that the key to good security is setting up proper VPNs (virtual private networks) which promised encryption and protection against malicious actors. With the rise of remote work, global work forces, contractors and trusted 3rd parties having access to the company network, having the right solution in place, coupled with proper logging and monitoring, can help you detect any potential issues before they become a major incident.
As VPNs become more advanced and offer more logging and insight capabilities, it is important to review what is available and ensure that the appropriate level of data is being captured to track back to the source host. For example, having logs that indicate all connection and authentication attempts are crucial for the security of a VPN setup, as the VPN endpoint is exposed to the internet and if there are compromised credentials, or a successful brute force attack, malicious actors may gain access to your corporate network. This happens in many cases where organizations have failed to adopt Multi-Factor Authentication.
That’s why VPN logs should be monitored in real-time for any anomalies. Any excessive authentication attempts or multiple failed attempts by a particular user, as well as historically, geographically improbable logins, may indicate that an attack is underway.
As with the rest of the security stack, VPN logs are only one piece of the puzzle, but do play a critical part when investigating account activity within your environment. In most modern-day security operations centers, these logs are forwarded to a logger and correlated with other data points being fed into the SIEM to help determine whether or not there is a potential situation. If there is, an alert or incident will be created within the SIEM for the analysts to review and investigate further.
If your organization still has a lot of data inside the corporate walls, you need to focus on VPN traffic monitoring to detect suspicious activity and known threats. While IT operations should also focus heavily on remote employees’ VPN usage, their primary focus should be ensuring there’s adequate availability over VPN for employees to access. Insights and visibility are the key starting points for monitoring an organization’s VPN. A security information and event management (SIEM) solution provides alerts is ultimately what both IT operations and the SOC need.
Investigating, performing pivots, and gathering data will reveal additional use cases that are unique to your business. An additional use case might be that users should always disconnect from a VPN session and not let the session timeout. “Max Session Timeout Reached” logs can be identified in your SIEM. Talking to your stakeholders, security leadership and IT teams can really help develop the right use cases so that your incident response team understands what normal and authorized activity versus what an anomaly could be.
As an incident responder having a baseline of what is normal and expected by working with the security operations teams and other internal teams can help you home in on what could be a potential threat actor exploiting the environment.
Stay tuned with our publications as we will continue to explore this topic.