<section title="18.7. Inverse split tunnel VPN"><subsection title="Objective"><paragraph
    title="18.7.1."


><![CDATA[<p class="1871">Agencies identify and effectively manage the risks and compensating controls involved in utilising inverse split tunnelling as part of remote access virtual private network (VPN) configurations.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.7.2."


><![CDATA[<p class="1871">This section covers information relating specifically to configuring secure remote access services (also known as VPN services) for agency devices that facilitate agency information (e.g., documents or emails) being transferred to remote systems.</p>]]></paragraph>
<paragraph
    title="18.7.3."


><![CDATA[<p class="1871">It is important to recognise that all systems that are able to hold or access agency information need protection from compromise.</p>]]></paragraph>
<paragraph
    title="18.7.4."


><![CDATA[<p class="1871">Traditional network design approaches have focussed on keeping agency information within a defined perimeter unless it is explicitly released through an approved gateway (such as via an email or file transfer system), even when being accessed remotely.</p>]]></paragraph>
<paragraph
    title="18.7.5."


><![CDATA[<p class="1871">There are a number of prevalent architecture patterns for delivering remote access services that support this traditional network design approach.  Typical patterns include:</p><ol style="list-style-type: lower-alpha;">
<li>Always-on VPN services from agency-owned or agency-managed devices.</li>
<li>As-needed VPN services from agency-owned or agency-managed devices.</li>
<li>Remote desktop, or thin client, services from any devices, including BYOD.</li>
<li>Remote, or virtual, applications accessed from any devices, including BYOD.</li>
</ol>]]></paragraph>
<paragraph
    title="18.7.6."


><![CDATA[<p class="1871">With an accelerated adoption of cloud delivered services, and agency moves to increase the level of work being performed remotely through online collaboration systems, the government has <a rel="noopener noreferrer" href="https://www.digital.govt.nz/dmsdocument/166~guide-to-optimising-network-traffic-for-cloud-services/html" target="_blank">published advice on the use of inverse split tunnel architectures</a> for remote access VPN services to improve performance.</p>]]></paragraph>
<paragraph
    title="18.7.7."


><![CDATA[<p class="1871">The architecture advice advocates for the use of inverse split tunnelling, where an explicit list of authorised and trusted internet based services are able to be directly accessed, bypassing agency perimeter controls.  Both the architecture advice, and the NZISM, advise against the use of full split tunnelling (i.e., allowing all internet traffic not destined to the agency internal networks to bypass agency security controls).</p>]]></paragraph>
<paragraph
    title="18.7.8."


><![CDATA[<p class="1871">The use of inverse split tunnel VPN configurations is most likely to be appropriate for agencies that are implementing Zero Trust Architecture approaches to network security.</p>]]></paragraph>
<paragraph
    title="18.7.9."


><![CDATA[<p class="1871">Inverse split tunnel VPN configurations have related, but different, considerations from designs that only support direct access to agency-managed cloud services from the internet (where devices do not also connect to a remote access VPN service).</p>]]></paragraph>
<paragraph
    title="18.7.10."


><![CDATA[<p class="1871">It is also important to recognise that directly accessed services represent cross-connectivity between systems and must be carefully controlled in order not to compromise trust zones.  The principles of separation and segregation must be applied.  These principles are discussed in section 22.1 – Cloud computing, and section 22.2 – Virtualisation.</p>]]></paragraph>
<paragraph
    title="18.7.11."


><![CDATA[<p class="1871">Cross-connection of systems may also create a gateway, whether or not it meets the technical definition of gateways.  It is important to refer to section 19.1 – Gateways, and section 19.2 – Cross domain solutions to understand the implications and relevant controls.</p>]]></paragraph>
<paragraph
    title="18.7.12."


><![CDATA[<p class="1871">In addition to this section, split tunnelling advice is further described in <a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">section 21 – Distributed working</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="18.7.13."


><![CDATA[<p class="1871">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td>
<h3>Reference</h3>
</td>
<td>
<h3>Title</h3>
</td>
<td>
<h3>Publisher</h3>
</td>
<td>
<h3>Source</h3>
</td>
</tr>
<tr>
<td>
<pre>&nbsp;</pre>
</td>
<td>
<pre>Guide to optimising network traffic for cloud services</pre>
</td>
<td>
<pre>GCDO</pre>
</td>
<td>
<pre><a rel="noopener noreferrer" href="https://www.digital.govt.nz/dmsdocument/166~guide-to-optimising-network-traffic-for-cloud-services/html" target="_blank">Guide to Optimising Network Traffic for Cloud Services | NZ Digital government</a></pre>
</td>
</tr>
</tbody>
</table><p class="1871">&nbsp;</p><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Inverse split tunnel in remote access VPN systems"><paragraph
    title="18.7.14.R.01."

    tags="Network Security,Technical,Split tunnelling"


><![CDATA[<p class="NormS17C9">Remote access VPN services that utilise any form of split tunnelling provide a mechanism for agency devices to connect directly to third party services, bypassing the traditional perimeter.  While this provides efficiencies in network routing and can improve agency worker’s device performance, it introduces a broader range of threats and vulnerabilities to be considered.</p>]]></paragraph>
<paragraph
    title="18.7.14.C.01."

    tags="Network Security,Technical,Split tunnelling"


    classification="All Classifications"
    compliance="Must"
    cid="7250"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST undertake a threat and risk assessment on the use of inverse split tunnelling prior to enabling the functionality in remote access VPN systems.</span></p>]]></paragraph>
<paragraph
    title="18.7.14.C.02."

    tags="Network Security,Technical,Split tunnelling"


    classification="All Classifications"
    compliance="Should"
    cid="7251"
><![CDATA[<p class="Normal-nonumbering">When providing inverse split-tunnelled access to internet based services (“directly accessed services”), the following aspects SHOULD be considered as part of the threat and risk assessment:</p><ul>
<li>How do directly accessed services authenticate agency device identities prior to granting access to the service?</li>
<li>How do agency devices securely resolve internet addresses for directly accessed services?</li>
<li>How are the communications between the devices and directly accessed services secured?</li>
<li>How does an agency monitor and account for access made to directly accessed services?</li>
<li>How does an agency protect devices from compromise if they are able to directly access internet based resources, or be directly accessed from the internet?</li>
<li>How do directly accessed services authenticate the user of the agency device prior to granting access to the service (this is separate to authenticating the agency device itself)?</li>
<li>How does an agency enforce the use of multi-factor authentication with directly accessed services?</li>
<li>How does an agency authorise access to directly accessed services, and does this include from devices that are not authorised to connect to agency remote access services (authorisation and authentication are separate activities)?</li>
<li>How is access to directly accessed cloud services removed when staff no longer require access or leave the agency?</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
