We are using a LAN-based POS (point-of-sale) system with an SSL feature on our network. How can we securely connect...
remote point-of-sale devices to our network?
Provided you have your devices configured to use strong encryption to protect the SSL traffic (AES 256-bit encryption is a great choice), you probably don't need anything else to ensure the confidentiality of transaction data. That is assuming, of course, that you've already applied other security best practices to both the local and remote networks and use firewalls, antivirus software and other standard controls.
That said, I'm never comfortable relying upon a single control. You'd probably sleep better at night if you had the added benefits of a virtual private network (VPN). If both ends of the connection are already protected by hardware firewalls, it's likely that you can configure a VPN tunnel between the two sites using the equipment you already have. If you're not already using firewalls, go get them! There's no excuse for not having this basic security control.
One other word of caution: If you process credit card transactions on these devices, you'll also need to comply with the Payment Card Industry Data Security Standard (PCI DSS). This is no trivial undertaking, and you may wish to consult the PCI DSS materials elsewhere on this site.
For more information
Get more information on the top LAN security issues in a client-server network environment.
Learn how to implement PCI network segmentation in this expert response.
Dig Deeper on VLAN Security Management
Related Q&A from Mike Chapple
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ...continue reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ...continue reading
Now that NIST has deprecated the use of SMS 2FA, should nongovernment organizations follow suit? Expert Mike Chapple discusses the risks of SMS-based...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.