Do you require a VPN for ALL remote work?

We’ve basically removed our client VPN in favor of a zero-trust model and SaaS services replacing much of our on-prem infrastructure that required the client VPN for remote access. I understand the added security layer of encapsulating all traffic on off-network laptops via a VPN, but since all web traffic is already encrypted now, it feels like an unnecessary step.

Our HR department is implementing a new remote work policy and part of it states that if the user cannot connect to the VPN, they cannot work remotely. I told them to remove that bit, but then I thought I’d pole the community to see if I was crazy or not. Am I?

Edit: Thanks everyone. You’ve given some great feedback and confirmed I’m going in the right direction. Much appreciated. :+1:

We have a mix - if you need on prem resources you’re on VPN, if you’re using SAAS only, you don’t need VPN.

Same reasoning as yours.

Have them reword the statement to say “remote users must be able to connect to the VPN for required services”. That keeps it vague enough so you can use service or app specific VPN like with zscaler, instead of sending all traffic back to the office, which is just silly.

And my last job, we had to work on leadership to allow split tunneling (instead of forcing all traffic) for video conferencing traffic, and at my new one we only require VPN for specific on-premise services.

There’s so many ways to address remote work without a VPN - including (but not limited to) device trust, zero trust models with geographic/other risk analysis at the identity layer. VPN’s used primarily as a security (as opposed to access) tool is looking at them the wrong way. You can and should require end-users to be on a VPN to access resources hosted on-premise.

On the other hand, there’s zero reason for one of your SE’s or AE’s to have to login to a VPN to log onto SFDC or Dynamics when they’re making a sales call, and you’re actually introducing performative friction in the process when you do that. You’re also making your BCDR processes worse for two reasons: one, now you’ve got a bunch of people who are likely to leave VPN’s connected at coffee shops or while their kids are around, so you’re introducing a greater likelihood, not lesser, of Bad Things Happening to your local network. Two, assuming you’ve got an AD/RADIUS dependency to logon to your VPN (as most do), now you’ve introduced a dependency to getting all work done. If you lose AD, now nobody, including a guy who just wants to update a quote in SFDC, can get anything done, and all of your SaaS services that don’t even touch AD are going to be inaccessible. This in turn is going to make things substantially harder for you.

Always secure things first at the user level (SSO, MFA, device trust, proper risk analysis before logon) when given the choice.

Sort of but indirectly. All computers have zScaler’s ZIA for cloud NGFW that they can’t disable. So while it doesn’t backhaul any internet traffic to us it does inspect 100% of their internet dealings.

We also use ZPA for access to on prem resources.

If no one needs to get to anything on-prem, you’re probably better off using an endpoint agent of some kind to manage web traffic for corporate devices with Conditional Access than forcing people through the VPN.

Your HR department found some boilerplate, and part of their boilerplate isn’t applicable. Just change it to a requirement that the user be able to connect to relevant services.

In my shop (healthcare) we actually eliminated VPN entirely; too many horror stories at conferences of hospitals getting backdoored through some exec with a laptop on vacation. Any resources you need to access remotely are either available as a SAAS offering (gsuite and so on) or are presented via xenapp/xendesktop. Policy is that remote machines never store business or patient date. Patient data and business documents containing PHI must remain resident in systems within the hospital’s direct custody, and other operational documents are kept either on-premises or within gsuite.

We allow BYOD pretty generously for remote workers, and assume that any device we issue for remote work will be immediately stolen with all data on it. BYOD and remote work devices get their own network segment, which only allows internet access, nothing horizontal, and devices on the patient care and administrative networks never leave the building. Admin machines have their access to outside systems severely restricted.

Tell them that remote work requires strong authentication and resources can only be accessed from authorized devices.

The required programs are installed locally on our users’ laptops, i.e. access to the company network via VPN is only necessary for access to the file server. However, many users often copy the necessary data to their laptop at the company if they want to work with it in their home office, as the files are often relatively large. Access to the company’s own e-mail server also works without VPN access.

We used to but now outlook, teams, and OneDrive will work off network from company devices

I haven’t had to use a VPN in the past year and a half. It’s amazing to just login and get to work.

Encryption and remote resources on an internal network are reasons for a VPN, sure. You could also use one as another layer of authentication, only allowing login to company platforms from specific IPs.

Or course not, traffic with O365 does not need to go through any VPN

We have an always on VPN (connect before sign in) with Meraki + AnyConnect, and then we use ZScaler. M365 conditional access restricts sign in to our ZScaler IPs. But we are in the financial industry and are required (in 2025) to use some kind of ZTNA/SASE solution.

Sorry… I have a really hard time comprehending HR’s role in the big US cooperate world…

Why the heck are HR responsible for implementing remote work strategies related to VPN or not?? It’s the IT departments responsibility and therefore them, with maybe a SEC guy sprinkled on top, that should be writing the guidelines…

What sort of employees?

End users? Nah.

Engineers? VPN for resources you don’t want an end user touching

Yes. We have Fortigate firewalls with the various threat detection systems on subscription that we route all users through when they’re working from home or in remote office or visiting clients. This ensures that their traffic is secure within the confines of security protocols we have to abide by.

if the user cannot connect to the VPN, they cannot work remotely.

Seems like a pretty reasonable take to me. If the software works well then I don’t see why

Our HR department is implementing a new remote work policy

Places I’ve worked for seem to have HR more focus on the opposite…emphasis on using own VPN/tunnel being a serious offence. People concealing location & working from odd places can be a bit of a shitstorm on taxes & labour laws etc.

yes. even if you are usuing saas resources even TEAMS requires vpn and mfa