An organization is expanding its onsite data center infrastructure to accommodate a recent growth in remote workforce. They are concerned with the creation of a secure network architecture. In this scenario, which of the following would be the BEST solution to ensure secure remote access while minimizing the attack surface?
Use a jump server as the sole access point for network management.
Deploy an intrusion detection system at the network perimeter.
Configure a proxy server to control and filter outbound internet traffic.
Install a virtual private network (VPN) for secure remote connections.