The National Security Agency (NSA) published an advisory that addresses the risks behind Transport Layer Security Inspection (TLSI) and provides mitigation measures for weakened security in organizations that use TLSI products. TLSI (aka TLS break and inspect) is the process through which enterprises can inspect encrypted traffic with the help of a dedicated product such as a proxy device, a firewall, intrusion detection or prevention systems (IDS/IPS) that can decrypt and re-encrypt traffic encrypted with TLS.
Experts Comments
Linkedin Message
@Justin Jett, Director of Audit and Compliance , provides expert commentary at @Information Security Buzz.
"Additionally, organizations should monitor TLS certificate metadata with network traffic analytics. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-comments-on-nsa-publishes-advisory-addressing-encrypted-traffic-inspection-risks
Facebook Message
@Justin Jett, Director of Audit and Compliance , provides expert commentary at @Information Security Buzz.
"Additionally, organizations should monitor TLS certificate metadata with network traffic analytics. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-comments-on-nsa-publishes-advisory-addressing-encrypted-traffic-inspection-risks
Be part of our growing Information Security Expert Community (1000+), please register here.
Linkedin Message
@Richard Bejtlich, Principal Security Strategist, provides expert commentary at @Information Security Buzz.
"Our new sensor feature profiles Secure Shell traffic to identify account access, file transfers, keystroke typing, and other activities...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-comments-on-nsa-publishes-advisory-addressing-encrypted-traffic-inspection-risks
Facebook Message
@Richard Bejtlich, Principal Security Strategist, provides expert commentary at @Information Security Buzz.
"Our new sensor feature profiles Secure Shell traffic to identify account access, file transfers, keystroke typing, and other activities...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-comments-on-nsa-publishes-advisory-addressing-encrypted-traffic-inspection-risks