Title | Minimize site-to-site VPNs | ||
---|---|---|---|
Link | |||
Summary |
The preferred approach is to use well-managed IP endpoints. These IP endpoints will provide controlled access per-client via the use of encryption, subnet firewalls, endpoint firewalls, application firewalls, load-balancers / proxies, segregated networks, intrusion prevention systems, access control policies, pro-active monitoring, and continual, full-stack software maintenance. IPv6 endpoints should be preferred whenever possible. | ||
Authority | Recommended by the University of Washington | ||
Approved By |
| ||
Date reviewed | July 2, 2018 | ||
Reviewed By: |
| ||
Source | Chief Technology Officer | ||
Status | |||
Rationale | As the UW adopts public Cloud services, there is often a need to connect back to resources on the UW private network. Public Cloud vendors often recommend establishing site-to-site VPNs. Neither does this approach scale, nor is it necessarily secure. Providing A well-managed public endpoints instead will promote: IP endpoint should:
| ||
Notes | Exceptions: Requests for new site-to-site VPNs and subnet extensions need to be approved by the UW-IT CTO (submit requests using help@uw.edu and mention this policy # in the subject). |
Page History
Overview
Content Tools
Activity