CISSP · · 5 min read

Network Access Control, VPNs, and Remote Connectivity: Letting People In Safely

Remote access is essential and risky. Learn how to choose and configure VPNs, NAC, and remote admin options so people can work from anywhere without opening the entire network.

Hook / Why this matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Remote work, partner access, and vendor support all depend on network connectivity from outside your walls. If you do not control how people connect and what they can reach once they are in, you effectively extend your internal network to the entire internet.

Core concept explained simply

Remote connectivity is about providing secure pathways into your environment while keeping exposure as small as possible. Network Access Control (NAC) and Virtual Private Networks (VPNs) are core tools, but they only work if you understand their strengths, limits, and configuration choices.

Types of remote access

Several patterns recur in enterprise networks:

The right choice depends on who needs access, from where, and to what.

How VPNs work at a high level

VPNs create encrypted tunnels between endpoints. A remote access VPN client establishes a secure tunnel to a gateway. Traffic inside that tunnel is protected from eavesdropping and tampering as it crosses untrusted networks.

Key concepts:

VPNs do not magically make everything on the far side safe. They simply provide a secure pathway into your environment.

Split tunneling vs full tunneling

Split tunneling decides whether a remote user's traffic goes only to the corporate network or both to the internet and the corporate network simultaneously.

With split tunneling, the remote device acts as a bridge between the corporate network and the public internet. Malware running on that device, or an attacker on the local network, can potentially use the VPN connection to reach internal resources.

Network Access Control fundamentals

Network Access Control verifies that devices meet certain conditions before connecting to the network. Typical checks include:

NAC often relies on 802.1X authentication at the switch or wireless controller, combined with a RADIUS server that makes access decisions.

Devices that do not meet policy may be placed in a quarantine network with limited access until they are remediated.

Identity centric and device aware access

Modern designs rely on both user identity and device posture. Instead of giving full network access to anyone with VPN credentials, organizations are moving toward:

This is more aligned with zero trust principles and reduces reliance on network location alone.

CISSP lens

For CISSP Domain 4, focus on:

When evaluating options in questions, ask yourself: "Does this approach limit what a compromised remote device or account can do?".

Real-world scenario

A consulting firm allowed remote staff and contractors to connect via a VPN from any device, including personal laptops. The VPN used split tunneling, and authentication relied only on usernames and passwords.

One contractor's personal laptop was infected with malware that established command and control back to an attacker. When the contractor connected to the corporate VPN, the malware:

Because there were few internal segmentation controls and no posture checks, the attacker quickly found and exfiltrated sensitive client documents.

In response, the firm made several changes:

These steps did not eliminate remote access risk, but they dramatically reduced the chance that a single infected personal device could threaten the entire network.

Common mistakes and misconceptions

Organizations often misstep in similar ways:

A CISSP should be able to articulate these issues and guide policy decisions.

Actionable checklist

To improve remote access and NAC in your environment:

Key takeaways

Optional exam-style reflection question

A remote employee connects to the corporate network using a VPN configured for split tunneling. What is the main security risk of this configuration?

Answer: With split tunneling, the employee's device is connected to both the internet and the corporate network at the same time. Malware on the device or an attacker on the local network can potentially use the VPN connection to access internal resources, bypassing corporate perimeter defenses.

Read next

© 2025 Threat On The Wire. All rights reserved.