Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The reason that no one has given yet is that you can monitor more carefully when you have a VPN. With a VPN, you can follow the bastion model; the VPN server runs only the VPN code and nothing else (with as much crap removed as possible), with a really restrictive SELinux policy, every tiny error logged and forwarded.

So now, since any attack has to be through the bastion, and all bastion errors are looked at by a human (because there should be only a few of them), then you're more likely to notice a breach more quickly because it won't become caught up in your general logs.

It should be noted that it's as easily possible to have the bastion server run an SSH server, and allow SSH access to other servers on your network.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: