Development and configuration of a corporate network based on the WireGuard protocol to isolate critical infrastructure and increase employee productivity through web resource access management.
Project objective
The primary objective was to protect the company's testing and production environments from any external threats. We needed to completely eliminate direct access to servers and source code from the open network, as well as implement a "digital hygiene" policy that would restrict the use of distracting resources and guarantee stable access to work tools.
Project features
The main feature was the implementation of multi-level protection, where knowing an account password is no longer a sufficient condition for entry. Access to the infrastructure is physically impossible without a unique VPN key. Additionally, the system flexibly manages routing: it recognizes traffic types, automatically blocking entertainment content and providing a "green corridor" for essential work services.
Solution
We implemented a Zero Trust architecture, making password theft useless for attackers, and a corporate VPN that completely hid the infrastructure (databases, code, admin panels) from external attacks. Using Access Control Lists (ACLs), non-target traffic was cut off, while priority routing ensured the uninterrupted operation of essential services, bypassing provider restrictions.
Results
The implementation of WireGuard based on Zero Trust completely hid the infrastructure from external threats, replacing vulnerable passwords with secure access keys. The configuration of ACLs and priority routing ensured stable connectivity with work services and increased team productivity by eliminating non-target traffic and the risks of the human factor.