Roles of nodes in VPNs (a node can have some or all):
* Authorisation: grant nodes access to the restricted use network
* Authorization: grant nodes access to the restricted use network
* Encryption: encrypt traffic within the confines of the restricted use network
* Edge: uses a public network to communicate with the restricted use network
* Gateway: provides link between public network and restricted use network
* Router: forward traffic between nodes in the restricted use network
* Filter: select which traffic may transit this node in the restricted use network
* Relays: assist nodes in connecting to the restricted use network
* Relay: assist nodes in connecting to the restricted use network
During reasonably foreseeable use, VPN nodes may:
* Authorise other nodes to use the restricted use network
* Request authorisation to use the restricted network
* Authorize other nodes to use the restricted use network
* Request authorization to use the restricted network
* Serve configuration information
* Update their configuration information
* Assist nodes in connecting to the restricted use network
@@ -357,7 +357,7 @@ The following risks are delegated by the VPN product to other components within
-**Operating System stability and Runtime Environment robustness**: A VPN product relies on a secure and stable underlying operating system (OS) to function. The risks associated with OS vulnerabilities or a compromised runtime environment are delegated to the OS.
-**Hardware Integrity**: The VPN product depends on the integrity of the physical hardware for the confidentiality of cryptographic keys and data processing. Risks of physical tampering or hardware-based attacks are delegated to the hardware manufacturer.
-**Identity and Authentication**: The VPN product delegates the risks associated with user credential management to a trusted Identity and Access Management (IAM) system. It relies on this external component for secure authentication and authorisation of users.
-**Identity and Authentication**: The VPN product delegates the risks associated with user credential management to a trusted Identity and Access Management (IAM) system. It relies on this external component for secure authentication and authorization of users.
## 4.6 Users
@@ -394,7 +394,7 @@ See [\[i.3\]](#_ref_i.3) for formal definitions of micro, small, and medium-size
* Actively circumventing observation from competitors, hackers, opponents, and unsanctioned state actors
* Does not connect endpoints with other endpoints directly
***UC-4** Small enterprise, small not-for-profit organisation
***UC-4** Small enterprise, small not-for-profit organization
* Limited or no full-time IT/network administration
* Seeking secure connections primarily to SaaS products
* Requires managed service for configuration and maintenance
@@ -449,9 +449,9 @@ Once the present document is cited in the Official Journal of the European Union
| Authentication and access control mechanisms | AUTH |
### C.4.13 TH-CNFS: Access to assets via configuration errors in single endpoint VPN
Attacker may use configuration errors to get unauthorised access to product assets in a single endpoint VPN.
Attacker may use configuration errors to get unauthorized access to product assets in a single endpoint VPN.
**Table C.4.13-1: Access to assets via configuration errors in single endpoint VPN**
@@ -997,7 +997,7 @@ Mitigations for Impact:
### C.4.14 TH-CNFM: Access to assets via configuration errors in a multi-endpoint VPN
Attacker may use configuration errors to get unauthorised access to product assets in a multi-endpoint VPN.
Attacker may use configuration errors to get unauthorized access to product assets in a multi-endpoint VPN.
**Table C.4.14-1: Access to assets via configuration errors in a multi-endpoint VPN**
@@ -1091,7 +1091,7 @@ Mitigations for Impact:
### C.4.17 TH-USED: Access to data via access to used product
Attacker may get unauthorised access to confidential data stored on the product through access to or acquisition of a device containing the used product.
Attacker may get unauthorized access to confidential data stored on the product through access to or acquisition of a device containing the used product.
**Table C.4.17-1: Access to data via access to used product**
@@ -1123,7 +1123,7 @@ Mitigations for Impact:
### C.4.18 TH-CPER: Compromise of Personal Data stored or transmitted by the product
Attacker may get unauthorised access to Personal Data stored or transmitted by the product.
Attacker may get unauthorized access to Personal Data stored or transmitted by the product.
**Table C.4.18-1: Compromise of Personal Data stored or transmitted by the product**
@@ -130,7 +130,7 @@ The product shall be checked for memory errors by running a tool that exercises
The product shall be implemented in a memory-safe language. Any use of unsafe memory features shall be documented to explain how that feature does not present a cybersecurity risk.
* Reference: TR-SSDD
* Objective: Prevent unauthorised memory access
* Objective: Prevent unauthorized memory access
* Preparation: None
* Activities: Review source code to determine its language and what exceptions to memory safety exist
* Verdict: Source code is in a memory-safe language and the documentation of all uses of unsafe memory features convincingly demonstrates that each one does not present a cybersecurity risk => PASS, otherwise FAIL
@@ -531,7 +531,7 @@ The VPN client shall by default encrypt all transmitted user credentials or sens
The VPN client, server, or other nodes shall not use session credentials with indefinite validity.
* Reference: TR-AUTH
* Objective: Protect VPN connection from unauthorised use
* Objective: Protect VPN connection from unauthorized use
* Preparation: Inspect, obtain or configure the session lifetime
* Activities: Obtain a session credential. After the configured session credential validity periode, attempt to conntect to the VPN server.
* Verdict: Connection is rejected => PASS, otherwise FAIL
@@ -581,7 +581,7 @@ DNS leaks occur if the client does not or only partially tunnels cleartext DNS t
Further, the user might want to set special DNS configuration either configured by the enterprise or custom configured in a consumer context. The VPN provider then must honour this DNS configuration.
A DNS server is authorised if:
A DNS server is authorized if:
1. the DNS server is configured by administrating user, or
2. the DNS server is provided by the VPN manufacturer
@@ -848,14 +848,14 @@ The minium scope of cybersecurity-relevant events logged by the VPN client may i
* changes applied by the VPN client to the host system's network configuration technically relevant for the VPN service provision, or
* software update successes or failures.
The log messages shall not include any confidential information such as Personal Data, network traffic content, connection metadata (e.g., destination IPs, DNS queries), secrets, or credentials. These logs shall be retained locally on the endpoint. To comply with data minimisation requirements, the VPN client shall not transmit these logs to the remote data processing solutions of the VPN manufacturer by default. Transmission of local logs to the manufacturer (e.g., for technical support or troubleshooting) shall require explicit, informed user authorisation (e.g. explicit opt-in).
The log messages shall not include any confidential information such as Personal Data, network traffic content, connection metadata (e.g., destination IPs, DNS queries), secrets, or credentials. These logs shall be retained locally on the endpoint. To comply with data minimization requirements, the VPN client shall not transmit these logs to the remote data processing solutions of the VPN manufacturer by default. Transmission of local logs to the manufacturer (e.g., for technical support or troubleshooting) shall require explicit, informed user authorization (e.g. explicit opt-in).
* Reference: TR-LOGG, TR-DMIN
* Objective: Monitoring and recording cybersecurity-relevant events
* Preparation: Review the manufacturer's documentation to confirm the scope of cybersecurity-relevant internal events implemented in the logging mechanism.
* Activities: For each type of cybersecurity-relevant internal event (authentication, connection state change, configuration modification, etc.), trigger the event on the endpoint. Attempt to locate any automated transmission of these logs to the manufacturer without explicit user consent.
* Verdict: For each triggered event, the local log contains a message indicating the event, log message does not include any information likely to be confidential, and logs are not transmitted to the manufacturer without explicit user authorisation => PASS, otherwise FAIL
* Evidence: Method of triggering events, log messages with annotations, and packet captures demonstrating no unauthorised transmission of logs.
* Verdict: For each triggered event, the local log contains a message indicating the event, log message does not include any information likely to be confidential, and logs are not transmitted to the manufacturer without explicit user authorization => PASS, otherwise FAIL
* Evidence: Method of triggering events, log messages with annotations, and packet captures demonstrating no unauthorized transmission of logs.
> NOTE: One type of event for which log messages must take care to not accidentally include a secret is failed password authentication attempts. Since users often type their password into the username field, including the username field in the log message may result in including a secret in the log message. Additionally, the product may provide an easy-to-use opt-out mechanism for users who do not wish to have internal activity recorded locally