CloudWiki
Rules
Low

Access allowed from VPN

Security & Compliance
No items found.
Description

"Access allowed from VPN" generally means that a network security group or firewall rule has been configured to allow incoming traffic from a specific Virtual Private Network (VPN) connection. This allows remote workers or branch offices connected to the VPN to access resources within the network, while preventing unauthorized access from external sources.

Remediation

To ensure that access is properly controlled and secured, organizations should implement the following remediation steps:

  1. Review VPN Access: Review all VPN access in the AWS environment to identify any security groups or firewall rules that allow incoming traffic from VPNs.
  2. Limit Access to Required Resources: Limit VPN access to only the necessary resources within the network, using least-privilege access controls.
  3. Implement Multi-Factor Authentication (MFA): Implement MFA for VPN connections to provide an extra layer of security.
  4. Regularly Audit and Review: Regularly audit and review VPN access controls to ensure that access is restricted and only authorized users and resources have access.

By implementing these remediation steps, organizations can help ensure that VPN access is properly controlled and secured, which can help reduce the risk of unauthorized access to the network and enhance the overall security posture of the AWS environment.

Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.