Q

Can Trojans and other malware exploit split-tunnel VPNs?

The beauty of split tunneling is that an enterprise doesn't need to provide the general Internet access point for a VPN user. Mike Chapple, however, also explains why split-tunnel VPNs provide a false sense of security.

How secure are split-tunnel VPNs? Is it possible for a Trojan, rootkit or other malware to infiltrate the corporate network via a split tunnel and expose sensitive data? And is it true that compliance regulations like PCI DSS frown on split-tunnel VPNs?
Split-tunnel VPNs are neither secure nor insecure in and of themselves. When making the decision to tunnel all traffic or implement split tunneling, however, you'll need to balance the desire to control all user traffic against the potential risks -- to both the user and the organization -- of handling external traffic.

The beauty of split tunneling is that your enterprise doesn't need to provide the general Internet access point for a VPN user. With split tunneling, the VPN client automatically determines whether a network location is accessible through the virtual private network and, if it is not, passes it directly through the network connection. If users send only 10% of their traffic to your corporate network, you're letting their current access...

provider handle the other 90% of the load.

On the other hand, split tunneling may leave users with a false sense of security. If they're following instructions to "connect to the VPN from the road," employees may believe that all of their traffic, including their personal email and Web browsing data, is encrypted by the VPN. They may not realize that the traffic is open to interception on the local network.

From a compliance perspective, PCI DSS doesn't make any statements about split tunneling. I believe you could construct a rational argument for either approach during a compliance audit. Split tunneling wouldn't really reduce the risk of malware infecting your corporate network. If it's present on a machine before it connects to the VPN, it will still be present on that machine when it connects, regardless of your VPN tunneling strategy. If you wish to ensure that systems connecting to your VPN are free of malware, I'd recommend investigating the use of network admission control (NAC) technology.

More information:

  • Mike Chapple explores the security risks of IPsec tunneling.
  • A SearchSecurity.com reader asks, "Do split-tunneling features make a VPN vulnerable?"
  • This was first published in February 2008

    Dig deeper on SSL and TLS VPN Security

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close