Infrastructure Security · IS-Q16B

Bonus Question: Are remote-access solutions (VPN, bastion hosts, zero-trust gateways) secured and monitored?

Why This Matters

Remote access is a high-value target for attackers. Proper configuration, authentication, and monitoring of VPNs and gateways are vital to prevent unauthorized access.

Maturity

0 — Unaware
Uncontrolled remote access; shared credentials.
1 — Ad Hoc
VPN enabled for IT staff without MFA.
2 — Defined
Role-based VPN access and MFA enforced.
3 — Managed
Session logging and geo-blocking implemented.
4 — Integrated
Zero-trust access broker integrated with SIEM.
5 — Optimized
Continuous risk-based authentication with analytics.

How to Level Up

| From → To | Actions | |—|—| | 0 → 1 |Restrict VPN to authorized employees.| | 1 → 2 |Implement MFA and access controls.| | 2 → 3 |Enable detailed logging and session review.| | 3 → 4 |Integrate zero-trust gateway and SIEM.| | 4 → 5 |Adopt adaptive, analytics-driven access controls.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

| Purpose | Tool | Notes | |—|—|—| | VPN | WireGuard / OpenVPN | Secure connectivity | | Monitoring | Wazuh / ELK | Log review and alerts | | Authentication | Authelia | MFA and SSO gateway |

Common Pitfalls

Compliance Mapping

| Standard | Clauses / Notes | |—|—| | ISO/IEC 27001 | A.8.23 / A.8.24 | | CERT-In 2022 | Section 13 | | NIST CSF 2.0 | PR.AC / DE.CM | | NIRMATA Mapping | IS-Q16B reinforces Infrastructure Security with secure, monitored remote access controls. |