An organization's existing infrastructure includes site-to-site VPNs between datacenters. In the past year, a sophisticated attacker exploited a zero-day vulnerability on the VPN concentrator. Consequently, the Chief Information Security Officer (CISO) is making infrastructure changes to mitigate the risk of service loss should another zero-day exploit be used against the VPN solution.
Which of the following designs would be BEST for the CISO to use?
- Adding a second redundant layer of alternate vendor VPN concentrators
- Using Base64 encoding within the existing site-to-site VPN connections
- Distributing security resources across VPN sites
- Implementing IDS services with each VPN concentrator
- Transitioning to a container-based architecture for site-based services
Reveal Solution Next Question