At the same time, a VPN alone won’t meet evolving security needs.
“Some of the biggest hacks that we’ve seen so far came from VPN issues,” Bae says. “You’re connecting your end user to your network, and there is no security other than whether you’ve authenticated. As soon as I connect to a VPN, you have the run of the entire data center, every application, every other server inside my corporate network. I can touch, I can infect, I can scan.”
Fortunately, agencies today have more connectivity options than ever.
“Like any product or offering, solutions, technologies and capabilities continue to evolve with new innovation, including solutions that offer more simplicity, security, with lower OPEX and CAPEX costs,” Hill says.
People periodically refresh their laptops, mobile phones and even automobiles.
“We need to take this same approach with cloud connectivity offerings,” Hill says.
MORE FROM FEDTECH: Learn why agencies should pay for servers like they do for cloud.
Questions to Ask About Connecting to the Cloud
In evaluating their cloud connectivity options, agencies must consider a range of factors.
First, they need to determine whether a given solution will provide robust connectivity. With the rise of remote and hybrid work models, employees may be in the office, at home or in a coffee shop.
“No matter where they are working, they need to be able to get to the same IT assets, the same applications and the same data,” Lunetta says.
“The first objective is to make access easy, seamless and high-performance,” he adds. “The experience for the end user must be the primary consideration.”
In addition, IT leaders need to look at the level of security available in a given solution.
“You have to protect the organization,” Lunetta says. “The more variety of where workloads run and where access happens, the bigger the attack surface and the more of a concern it is to the security group.”
A simple internet connection likely won’t be enough to fulfill that requirement because your internet service provider (ISP) isn’t in the business of securing your traffic.
“You need a solution that says, ‘I will ensure that these packets that I’m using in this application are never tampered with,’” Bae says. “‘And if someone tampers with these, I’ll immediately disconnect and let you know.’”
The solution should support zero-trust security, the ability to know and manage everything and everyone that’s connected to the network.
“That should be a driving element in evaluating these different strategies,” Lunetta says. “The set of factors to be weighed includes cost, performance, experience and security; it is a fairly sophisticated conversation, but it has to happen.”
DISCOVER: Read how OPM is using TMF funds to improve its zero-trust architecture.
Here Are Some Other Options for Connecting to the Cloud
Other methodologies may come into play as agencies look to improve cloud connectivity. VPNs are still an option, but as noted above, security issues mean they can no longer stand alone.
Direct cloud access via the network service providers “offers a private network connection between an agency’s private VPN service and the customer’s cloud provider offering,” Hill says. “This type of service is relevant for those customers already leveraging an IP VPN transport service.”
IT leaders will also want to factor in their ISP’s cloud exchange strategy.
“Cloud exchange is like Grand Central station; it’s where all the different lines come to meet so users can jump on and jump off and go to different places,” Bae says. “As an infrastructure person, you want to investigate these ISPs to see which exchange they connect with. If you have a predominant presence in the Northeast, you’re not going to use an ISP that has the bulk of its infrastructure on the West Coast.”
Ultimately, any means of connectivity will likely connect back to SD-WAN.
While various means can support data transport, SD-WAN provides “a consistent operational model for the branch router connectivity into the cloud,” Hill says. “Regardless of the underlay, SD-WAN could be leveraged as that overlay into the cloud.”