Skip to content

"Examining challenges related to TLS 1.3 visibility within corporate environments"

Data encryption safeguards transmission and storage of information, ensuring privacy and authenticity. However, it creates hurdles for IT departments due to the evolution of encryption techniques like TLS 1.3. These developments are pushing traditional methods of monitoring and governing...

Enhancing Transparency of TLS 1.3 Implementation within Businesses
Enhancing Transparency of TLS 1.3 Implementation within Businesses

The National Cybersecurity Center of Excellence (NCCoE) at NIST has launched a project to address challenges in maintaining network visibility when using Transport Layer Security (TLS) 1.3. The published guide, titled NIST SP 1800-37 "Addressing Visibility Challenges with TLS 1.3", provides administrators with practical tools and approaches to ensure transparency in network traffic, even with TLS 1.3.

TLS 1.3, a secure protocol used to protect the integrity and confidentiality of data transmitted over the internet, consistently implements Forward Secrecy, making passive decryption techniques for traffic monitoring more difficult. This guide shows companies how to ensure transparency in controlled data center environments despite the enhanced protection of TLS 1.3.

The project involves technology providers and enterprise customers as collaborators, and the methods presented in NIST SP 1800-37 apply exclusively to internal corporate communication channels. The publication includes practical examples, references to technical details, and a mapping of TLS 1.3 transparency principles to common security standards and regulatory requirements.

Digital government services are often routed through foreign networks, adding another layer of complexity to network visibility. The project by NCCoE uses standard-compliant implementations suitable for real-time monitoring as well as post-analysis.

In other news, Google Sheets now offers client-side encryption in its full capacity, and ATHENE researchers are working on the foundation of modern encryption.

For more information, follow us on X, Bluesky, Mastodon, Reddit, Facebook, and Email. The source of the image is depositphotos.com.

Read also:

Latest