SSL/TLS as a Potential Threat Vector
SSL/TLS encryption is rising as enterprises face more stringent security mandates, need to ensure optimal SEO rankings, deploy more workloads to the cloud and make wider use of software-as-a-service (SaaS) applications. In fact, over 90 percent of internet traffic around the globe is now encrypted.[1]
Unfortunately, encryption isn’t limited to well-meaning parties. Consider that over 2.8 Million cyber-attacks in 2018 were hidden in encrypted traffic.[2] Cybercriminals use encryption to conceal malware, hide command-and-control traffic and cloak the exfiltration of stolen data.
Given the amount of encrypted traffic, including with the latest TLS 1.3 cryptographic protocol, the threat vector it now poses and the importance of traffic inspection for a Zero Trust Posture, you need a way to efficiently decrypt SSL traffic, share it with tools and then re-encrypt it.
What is SSL Decryption/TLS Decryption?
To protect vital data, businesses and other organizations implement Transport Layer Security (TLS), commonly referred to as the superseded Secure Socket Layer (SSL), to encrypt data as it is exchanged over IP networks. SSL/TLS creates a secure channel between the server and the end users’ computer or other devices as they exchange information over the internet.
TLS is an industry standard based on a system of trusted rules and certificates issued by certificate authorities and recognized by servers. SSL was replaced by the TLS standard in 2015. In 2018, TLS 1.3 was standardized which mandates the use of Perfect Forward Secrecy for maximum security. Up to 40 percent of large enterprises have already instituted this latest incarnation.[3]
While protecting data, encryption also blinds network security and application monitoring tools. The decryption of SSL/TLS traffic is crucial for these tools. However, it is extremely computationally intensive and can introduce network latency.
The best architecture minimizes the decryption required to inspect all relevant traffic while offering legal and privacy controls. The centralized approach to decrypting SSL offered by Gigamon, decrypt once and feed all tools, provides such an architecture.
GigaSMART Decryption
GigaSMART® SSL/TLS Decryption is a licensed application that enables information security, NetOps and applications teams to obtain complete visibility into SSL/TLS traffic regardless of protocol or application, so that they can monitor application performance, analyze usage patterns and secure their networks against data breaches and threats using encrypted communications. Gigamon supports both inline/Man in the middle and passive/out-of-band decryption of SSL/TLS, meeting the diverse needs of your organization. Gigamon supports the latest TLS 1.3.
- SSL/TLS detection on any port or application
- 10 Mb to 100Gb interface support
- Decrypt once, share with any tools as many times as you need
- Strong crypto support including Diffie-Hellman Ephemeral, Elliptic Curves, Poly1305/ChaCha20
- Power controls over certificate validation, extending Certificate Revocation Lists and Online Certificate Status Protocol (OCSP)
- Integration with the Venafi Trust Protection Platform™ to centralize key management and validation
- Meet privacy and compliance requirements: included support for URL categorization
Take advantage of our new bundled GigaSMART apps and stay secure!
'업무이야기 > 패킷전달플랫폼' 카테고리의 다른 글
Advanced Flow Slicing (0) | 2020.06.04 |
---|---|
Data De-duplication (0) | 2020.06.04 |
NetFlow Generation (0) | 2020.06.04 |
GigaSmart (0) | 2020.06.04 |
GigaVUE® HC Series (0) | 2020.06.04 |