University of Bahrain | College of IT | Department of Computer Engineering
"Redefining remote work infrastructures in the security context"
This project presents a secure remote network solution plan designed to help organizations protect
their internal assets while enabling a flexible remote workforce. Through an extensive literature
review (2020–2025) and a survey of 170 respondents on cybersecurity awareness, we analyzed the most
prevalent attacks in the remote work era and the essential security practices needed to mitigate them.
We then evaluated four key technologies: SSL VPN, Zero Trust Architecture (ZTA), SD-WAN, and SASE against
criteria such as performance, scalability, deployment complexity, and trust model, and designed three
integrated solution plans tailored to different organization sizes. The resulting frameworks balance security,
cost, and usability, and highlight the central role of employee training, regulatory compliance, and phased
deployment in securing remote environments.
Our project relied on secondary research of external sources for the analysis conducted and the solutions created. Below is a figure that summarizes all the steps that were taken to collect infrormation, how the information was used, and where the information was collected. Additionally, a survey was conducted to pool information about the public's general awareness of cybersecurity attacks that are most prevalent in the remote work era. The survey questions can be viewed here. This allowed us to collect some of our own information alongside the analysis conducted through secondary resources.
Most of the implementation utilizes SSL VPN configurations to leverage its low cost of deployment and maintenance,
and its ease of use for small networks. The VPN servers are in a DMZ, and their functionalities and role in the architecture
is defined in the table below. The function of the DMZ is to protect the traffic moving between the VPN servers to the internal
network and the external, shared network, to the remote user. The firewalls protect both the internal network, and ensure that if
there is malicious traffic infiltrating the system, it does not affect the remote worker as well.
This diagram shows how different remote workers can connect to the organization's branches and access internal resources through the SD-WAN fabric.
This is through the use of SD-WAN edge devices and remote SD-WAN services such as vManage, vBond, and vAnalysis. This picture shows a basic implementation
of a remote, SD-WAN network that provides one worker with access to an enterprise's multiple resources, including cloud services and company sites. It also shows
how a system administrator can remotely manage the network using the afforementioned services.
This implementation is built off both the SD-WAN concept, but it more specifically considers
how it can integrate into a cloud-native architecture. In this theoretical example, the
organization has a private data center, and so each remote worker and internal worker must be
provided with secure access to the cloud resources. In some cases, certain employees are given
access to the data center, depending on job role and privileges. Additionally, the presence of
different inspection points allows for continuous authentication and verification and also
ensures that remote workers connecting from various geographic locations can benefit from
reduced latency. The PoP device can also act as an SD-WAN appliance that helps interconnect
the different sites in the SD-WAN fabric.