Example of Virtual Private Network (VPN)Policy

1. Purpose

The purpose of this policy is to provide guidelines for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the XXX corporate network.Virtual Private Network (VPN) connections provide a convenient way for staff to access internal network resources remotely over the network. It also provides a mechanism for staff and vendors to provide support for applications and software remotely. Like any remote connection, they must be carefully managed and secured.

2. Scope

This policy applies to all XXX employees, contractors, consultants, temporaries, and other workers including all personnel affiliated with third parties utilizing VPNs to access the XXX network. This policy applies to implementations of VPN that are directed through an IPSec Concentrator.

3. Policy

3.1 General

Approved XXX employees and authorized third parties (customers, vendors, etc.) may utilize the benefits of VPNs, which are a “user managed” service. This means that the user is responsible for selecting an Internet Service Provider (ISP), coordinating installation, installing any required software, and paying associated fees.


  1. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to XXX internal networks.
  2. VPN use is to be controlled using either a one-time password authentication such as a token device or a public/private key system with a strong passphrase.
  3. When actively connected to the corporate network, VPNs will force all traffic to and from the PC over the VPN tunnel: all other traffic will be dropped.
  4. Dual (split) tunneling is NOT permitted; only one network connection is allowed.
  5. VPN gateways will be set up and managed by XXX network operational groups.
  6. All computers connected to XXX internal networks via VPN or any other technology must use the most up-to-date anti-virus software that is the corporate standard (provide URL to this software); this includes personal computers.
  7. VPN users will be automatically disconnected from XXX’s network after thirty minutes of inactivity. The user must then logon again to reconnect to the network. Pings or other artificial network processes are not to be used to keep the connection open.
  8. The VPN concentrator is limited to an absolute connection time of 24 hours.
  9. Users of computers that are not XXX-owned equipment must configure the equipment to comply with XXX’s VPN and Network policies.
  10. Only IT-approved VPN clients may be used.
  11. By using VPN technology with personal equipment, users must understand that their machines are a de facto extension of XXX’s network, and as such are subject to the same rules and regulations that apply to XXX-owned equipment, i.e., their machines must be configured to comply with IT’s Security Policies.

3.2 Administration and Management Responsibilities

IT Department shall ensure the following for all VPN users:

  • All computers connected to via VPN or any other similar remote technology must use up-to-date virus and malware protection software
  • VPN users shall be automatically disconnected from the network after a specified period of inactivity.
  • Support shall disallow pings or other artificial network processes to keep the connection open

3.3 Audit Controls and Management

On-demand documented procedures and evidence of practice should be in place for this operational policy. Satisfactory examples of evidence and compliance include:

  • Logs of authorized VPN users
  • Anecdotal ticketing information showing compliance with this procedure
  • Documented help and user documentation for remote VPN installations
  • Archival communication documentation showing policy implementation

4. Policy Compliance

4.1 Compliance Measurement

The IT team will verify compliance to this policy through various methods, including but not limited to, periodic walk-thrus, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner.

4.2 Exceptions

Any exception to the policy must be approved by the IT Team in advance.

4.3 Non-Compliance

An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

Leave a Reply