SlideShare a Scribd company logo
How to Gain Visibility into Encrypted Threats
Achieving
Visibility/Control
Encryption
Challenges
SSL/TLS
Trends
60%
61%
89%
34% 25%
11%
2015 2016 2017
TLS 1.2
SSL 3.0
80%of sampled page
loads use SSL/TLS
TLS 1.2 vs. SSL 3.0
Heavy adoption of
Microsoft Office 365
Google Search
results rankings
Increased focus
on user privacy
Continuing growth and
use of social networks
Google Chrome
browser warnings
GDPR compliance
SSL/TLS
Encryption
Business
Drivers
Even
governments
recognise
the potential
security issues
Complexity
burdens IT with
inefficiencies
Performance
can degrade when
decrypting at scale
Visibility
is reduced due to the
growth of SSL usage
You can’t secure what you can’t see
of all Internet
traffic is encrypted
of page loads are now
encrypted with SSL/TLS70% 80%
Source: TLS Telemetry Report, F5 Labs, April 2018
Untrusted Networks Security Services
SSL/TLS BLIND SPOT
Encryption creates a blind spot in your network m
Exploitation Command & Control Data Exfiltration
Data
C&C
RSA, most common
Key exchange
Diffie-Hellman (Ephemeral)
Key agreement
vs.
1 Client Hello
1
Client Hello
Supported Cipher Suites
Guesses Key Agreement Protocol
Key Share
2
Server Hello
Key Agreement Protocol
Key Share
Server Finished
3
Checks Certificate
Generates Keys
Client Finished
Step Client Direction Message Direction Server
5 Server Hello Done
6 Client Key Exchange
7 Change Cipher Spec
8 Finished
9 Change Cipher Spec
10 Finished
3 Certificate
4 Server Key Exchange
2 Server Hello
Step Client Direction Message Direction Server
88% of hosts prefer
forward secrecy
Ephemeral
Keys
Perfect
Forward
Secrecy
Automatically and
frequently changes the
keys used to encrypt and
decrypt information,
exposing only a small
portion of sensitive user
data if the latest key is
compromised
Cipher suite
Encryption
key size
Key exchange
mechanism
ECDHE-RSA-AES128-GCM-SHA256 128 bit
ECDH, encryption:
AES, MAC: SHA256
ECDHE-RSA-AES128-SHA 128 bit
ECDH, encryption:
AES, MAC: SHA1
ECDHE-RSA-AES256-SHA 256 bit
ECDH, encryption:
AES, MAC: SHA1
ECDHE-RSA-3DES-EDE-SHA 168 bit
ECDH, encryption:
3DES, MAC: SHA1
ECDHE-RSA-RC4128-SHA 128 bit
ECDH, encryption:
RC4, MAC: SHA1
Unique Key to
Each Connection
Untrusted
Networks
Edge Firewall Switch Apps
Network Tap
PFS removes ability to do inbound
traffic passive inspection
Firewall performance tests
conducted by NSS Labs
Response time
increased by 672%
60% drop in the
average throughput
Next-Gen
Firewall
Web Gateway DLP Anti-Malware IPS Next-Gen
Firewall
Decrypt,
Inspect,
Re-Encrypt
Decrypt,
Inspect,
Re-Encrypt
Decrypt,
Inspect,
Re-Encrypt
Decrypt,
Inspect,
Re-Encrypt
Users Internet /
Apps
Security
inspection
devices are not
the right tool
for decryption
Privacy
Performance
End-user experience
Purpose-built solution for orchestration of inbound/outbound SSL/TLS traffic
Users Internet /
Apps
Next-Gen
Firewall
Next-Gen
IPS
Malware
Protection
Secure Web
Gateway
Data Loss
Prevention
Other
SSL
Orchestrator
Visibility is not enough
Still requires manual “daisy-chaining” or tedious
configurations across the security stack
Broad topology and device
support
Dynamic service chaining
Policy-based traffic steering
Advanced monitoring, load
balancing, and scaling
Centralised and simplified
management of certificates
and keys
Proxy-level control over
ciphers and protocols
SSL
Orchestration:
More than
visibility
Dynamic grouping
of security devices
Topology independent
Maximised security
investments
Service insertion,
monitoring, scaling
Firewall
IDS
WAF
1
Firewall
IPS
WAF
DLP
2
Firewall
IPS
WAF
DLP
Forensics
3
Source Addr.
Dest. Addr.
Dest. Port
IP Geo
Domain
Name
IPI Cat.
URL Cat.
Protocol
Contextual
classification
engine
Traffic
Classifier Engine
Service
Chain
Incoming
Traffic
Rich set
of traffic
selectors
Decrypt and steer to
service chain based
on policy match
Banks,
Healthcare
Bypass
HTTP/
HTTPS
Everything
else
Bypass, block,
inspect actions
SSL
Orchestrator
Users
Policy-Based Traffic Steering
Source IP
Destination IP
IP intelligence category
URL filtering category
In Out
IP geolocation
Host and domain name
Destination port
Protocol
SSL/TLS
Termination
and Inspection
Web Application Firewall IDS/IPS Customer Experience Solutions
Apps
Dynamic Service Chaining
chainX
chainY
bypass
reject
SSL
Orchestrator
Users
Policy-Based Traffic Steering
Source IP
Destination IP
IP intelligence category
URL filtering category
In Out
IP geolocation
Host and domain name
Destination port
Protocol
SSL/TLS
Termination
and Inspection
Internet
Dynamic Service Chaining
chainX
chainY
bypass
reject
IDS/IPS Malware Sandbox Secure Web GatewayNext-Gen Firewall Data Loss Prevention
PFS
Apps
Tap Switch
PFS
RSA
Users SSL
Orchestrator
SSL/TLS
Termination
and Inspection
SSL Visibility
Users
SSL
Orchestrator
Internet /
Apps
Firewall Internet /
Apps
Firewall
NGFW (Pool) IPS (Pool) Anti-Malware (Pool) DLP (Pool)
Inline Insertion
(L3 Mode)
Inline Insertion
(L2 Mode) ICAP
SIEM
Passive
Decrypt and Steer Re-Encrypt
SSL
Orchestrator
Users
Inline Layer 2
Receive Only
Inline Layer 3
Inline Layer 3
ICAP
ICAP
Suspect
IP dest.
Receive
Only
Inline
Layer3
Inline
Layer2
Inline
Layer3
Partner
domains
Inline
Layer3
Inline
Layer2
Inline
Layer3
Requires
PCI data
privacy
Receive
Only
Create services
Risky
web sites
Receive
Only
Inline
Layer3
Inline
Layer2
Inline
Layer3
ICAP ICAP
Chain services
Security inspection devices can be grouped, monitored, scaled, and load balanced independently.
Policy-based traffic steering directs traffic through the appropriate service chain based on risk and context.
Enterprise Key
Management
Secure Vault
Software-based encrypted storage
system for securing cryptographic keys
with the highest performance
Internal HSM
Physical hardware designed
to generate, store, and protect keys
with high performance
Network HSM
Integration with leading network-based
hardware for use with all appliances,
chassis, and virtual editions
Cloud HSM
Integration for high-assurance
encryption services fit for the cloud
HSM = Hardware Security Module
Untrusted Networks Security Services
?
Source: Technical Alert 17-318A, National Cybersecurity and
Communications Integration Center (NCCIC), November 2017
Full proxy
SSL
Orchestrator
Untrusted Networks
!
IDS/IPS Malware Sandbox Secure Web GatewayNext-Gen Firewall Data Loss Prevention
!
SSL Orchestrator
Key Use Cases
SSL/TLS visibility
and orchestration
Maximised security
investments
Risk management
and privacy
F5 BIG-IP and
Symantec DLP
F5 BIG-IP and
Palo Alto Networks NGFW
F5 BIG-IP and
FireEye NX
How to Gain Visibility into Encrypted Threats
Deploy into any
environment
Offer ease of integration
with unique network
topologies and security
inspection devices
Go beyond
visibility
Provide centralised de-
cryption and policy-based
traffic steering across
multiple security tools
Dynamically
chain services
Remove limitations
of daisy-chaining and
manual configuration
How to Gain Visibility into Encrypted Threats

More Related Content

PPTX
Preventing Today's Malware
PPSX
SonicWALL Advanced Features
PDF
SDN and Security: A Marriage Made in Heaven. Or Not.
PPT
GDP Product Presentation
PPTX
Get an office 365 expereience your users will love v8.1
PDF
(SACON 2020) Adventures In SDN Security
PDF
Cisco amp for meraki
PDF
Identity-Based Security and Privacy for the Internet of Things
Preventing Today's Malware
SonicWALL Advanced Features
SDN and Security: A Marriage Made in Heaven. Or Not.
GDP Product Presentation
Get an office 365 expereience your users will love v8.1
(SACON 2020) Adventures In SDN Security
Cisco amp for meraki
Identity-Based Security and Privacy for the Internet of Things

What's hot (20)

PPTX
O365 quick with fast user experience
PDF
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
PDF
Check point response to Cisco NGFW competitive
PDF
Azure Information Protection
PPTX
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Reducing Your Attack Surface
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PDF
The AWS Shared Responsibility Model in Practice
PDF
Reality Check: Security in the Cloud
PPTX
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
PPTX
DEVNET-1180 Security from the Cloud
PPTX
Migration to microsoft_azure_with_zscaler
PDF
Realities of Security in the Cloud
PDF
Corpsec: “What Happened to Corpses A and B?”
PDF
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
PPTX
How sdp delivers_zero_trust
PPTX
Ma story then_now_webcast_10_17_18
PPTX
Cerdant Security State of the Union
PDF
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
O365 quick with fast user experience
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Check point response to Cisco NGFW competitive
Azure Information Protection
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
The AWS Shared Responsibility Model in Practice
Reality Check: Security in the Cloud
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
DEVNET-1180 Security from the Cloud
Migration to microsoft_azure_with_zscaler
Realities of Security in the Cloud
Corpsec: “What Happened to Corpses A and B?”
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
How sdp delivers_zero_trust
Ma story then_now_webcast_10_17_18
Cerdant Security State of the Union
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
Ad

Similar to How to Gain Visibility into Encrypted Threats (20)

PDF
F5 TLS & SSL Practices
PDF
Decrypting and Selectively Inspecting Modern Traffic
PPTX
Protection and Visibitlity of Encrypted Traffic by F5
PDF
Ssl visibility solution - eWalker SSL
PDF
BAIT1103 Chapter 4
PPT
Web securiy - Network security essentials
PPTX
Certificate pinning in android applications
DOCX
Transport Layer Security
PDF
Computer network (4)
PDF
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
PPT
Introduction to Secure Sockets Layer
PDF
SSL and TLS Theory and Practice 3rd Edition Rolf Oppliger
PDF
Introduction of an SSL Certificate
PPT
Web security.ppt and Information Security introduction and management.pptx
PDF
#Morecrypto (with tis) - version 2.2
PPT
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
PDF
Vtu network security(10 ec832) unit 5 notes.
PPTX
ION Sri Lanka - TLS for Network Operators
PPT
ch16-Cryptography and Network Security.ppt
PDF
SSL State of the Union
F5 TLS & SSL Practices
Decrypting and Selectively Inspecting Modern Traffic
Protection and Visibitlity of Encrypted Traffic by F5
Ssl visibility solution - eWalker SSL
BAIT1103 Chapter 4
Web securiy - Network security essentials
Certificate pinning in android applications
Transport Layer Security
Computer network (4)
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
Introduction to Secure Sockets Layer
SSL and TLS Theory and Practice 3rd Edition Rolf Oppliger
Introduction of an SSL Certificate
Web security.ppt and Information Security introduction and management.pptx
#Morecrypto (with tis) - version 2.2
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Vtu network security(10 ec832) unit 5 notes.
ION Sri Lanka - TLS for Network Operators
ch16-Cryptography and Network Security.ppt
SSL State of the Union
Ad

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
A Presentation on Artificial Intelligence
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
A Presentation on Artificial Intelligence
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectral efficient network and resource selection model in 5G networks
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology

How to Gain Visibility into Encrypted Threats

  • 3. 60% 61% 89% 34% 25% 11% 2015 2016 2017 TLS 1.2 SSL 3.0 80%of sampled page loads use SSL/TLS TLS 1.2 vs. SSL 3.0
  • 4. Heavy adoption of Microsoft Office 365 Google Search results rankings Increased focus on user privacy Continuing growth and use of social networks Google Chrome browser warnings GDPR compliance SSL/TLS Encryption Business Drivers
  • 6. Complexity burdens IT with inefficiencies Performance can degrade when decrypting at scale Visibility is reduced due to the growth of SSL usage
  • 7. You can’t secure what you can’t see of all Internet traffic is encrypted of page loads are now encrypted with SSL/TLS70% 80% Source: TLS Telemetry Report, F5 Labs, April 2018
  • 8. Untrusted Networks Security Services SSL/TLS BLIND SPOT Encryption creates a blind spot in your network m
  • 9. Exploitation Command & Control Data Exfiltration Data C&C
  • 10. RSA, most common Key exchange Diffie-Hellman (Ephemeral) Key agreement
  • 11. vs. 1 Client Hello 1 Client Hello Supported Cipher Suites Guesses Key Agreement Protocol Key Share 2 Server Hello Key Agreement Protocol Key Share Server Finished 3 Checks Certificate Generates Keys Client Finished Step Client Direction Message Direction Server 5 Server Hello Done 6 Client Key Exchange 7 Change Cipher Spec 8 Finished 9 Change Cipher Spec 10 Finished 3 Certificate 4 Server Key Exchange 2 Server Hello Step Client Direction Message Direction Server 88% of hosts prefer forward secrecy
  • 12. Ephemeral Keys Perfect Forward Secrecy Automatically and frequently changes the keys used to encrypt and decrypt information, exposing only a small portion of sensitive user data if the latest key is compromised Cipher suite Encryption key size Key exchange mechanism ECDHE-RSA-AES128-GCM-SHA256 128 bit ECDH, encryption: AES, MAC: SHA256 ECDHE-RSA-AES128-SHA 128 bit ECDH, encryption: AES, MAC: SHA1 ECDHE-RSA-AES256-SHA 256 bit ECDH, encryption: AES, MAC: SHA1 ECDHE-RSA-3DES-EDE-SHA 168 bit ECDH, encryption: 3DES, MAC: SHA1 ECDHE-RSA-RC4128-SHA 128 bit ECDH, encryption: RC4, MAC: SHA1 Unique Key to Each Connection
  • 13. Untrusted Networks Edge Firewall Switch Apps Network Tap PFS removes ability to do inbound traffic passive inspection
  • 14. Firewall performance tests conducted by NSS Labs Response time increased by 672% 60% drop in the average throughput Next-Gen Firewall Web Gateway DLP Anti-Malware IPS Next-Gen Firewall Decrypt, Inspect, Re-Encrypt Decrypt, Inspect, Re-Encrypt Decrypt, Inspect, Re-Encrypt Decrypt, Inspect, Re-Encrypt Users Internet / Apps
  • 15. Security inspection devices are not the right tool for decryption Privacy Performance End-user experience
  • 16. Purpose-built solution for orchestration of inbound/outbound SSL/TLS traffic Users Internet / Apps Next-Gen Firewall Next-Gen IPS Malware Protection Secure Web Gateway Data Loss Prevention Other SSL Orchestrator
  • 17. Visibility is not enough Still requires manual “daisy-chaining” or tedious configurations across the security stack
  • 18. Broad topology and device support Dynamic service chaining Policy-based traffic steering Advanced monitoring, load balancing, and scaling Centralised and simplified management of certificates and keys Proxy-level control over ciphers and protocols SSL Orchestration: More than visibility
  • 19. Dynamic grouping of security devices Topology independent Maximised security investments Service insertion, monitoring, scaling Firewall IDS WAF 1 Firewall IPS WAF DLP 2 Firewall IPS WAF DLP Forensics 3
  • 20. Source Addr. Dest. Addr. Dest. Port IP Geo Domain Name IPI Cat. URL Cat. Protocol Contextual classification engine Traffic Classifier Engine Service Chain Incoming Traffic Rich set of traffic selectors Decrypt and steer to service chain based on policy match Banks, Healthcare Bypass HTTP/ HTTPS Everything else Bypass, block, inspect actions
  • 21. SSL Orchestrator Users Policy-Based Traffic Steering Source IP Destination IP IP intelligence category URL filtering category In Out IP geolocation Host and domain name Destination port Protocol SSL/TLS Termination and Inspection Web Application Firewall IDS/IPS Customer Experience Solutions Apps Dynamic Service Chaining chainX chainY bypass reject
  • 22. SSL Orchestrator Users Policy-Based Traffic Steering Source IP Destination IP IP intelligence category URL filtering category In Out IP geolocation Host and domain name Destination port Protocol SSL/TLS Termination and Inspection Internet Dynamic Service Chaining chainX chainY bypass reject IDS/IPS Malware Sandbox Secure Web GatewayNext-Gen Firewall Data Loss Prevention
  • 25. Firewall Internet / Apps Firewall NGFW (Pool) IPS (Pool) Anti-Malware (Pool) DLP (Pool) Inline Insertion (L3 Mode) Inline Insertion (L2 Mode) ICAP SIEM Passive Decrypt and Steer Re-Encrypt SSL Orchestrator Users
  • 26. Inline Layer 2 Receive Only Inline Layer 3 Inline Layer 3 ICAP ICAP Suspect IP dest. Receive Only Inline Layer3 Inline Layer2 Inline Layer3 Partner domains Inline Layer3 Inline Layer2 Inline Layer3 Requires PCI data privacy Receive Only Create services Risky web sites Receive Only Inline Layer3 Inline Layer2 Inline Layer3 ICAP ICAP Chain services Security inspection devices can be grouped, monitored, scaled, and load balanced independently. Policy-based traffic steering directs traffic through the appropriate service chain based on risk and context.
  • 27. Enterprise Key Management Secure Vault Software-based encrypted storage system for securing cryptographic keys with the highest performance Internal HSM Physical hardware designed to generate, store, and protect keys with high performance Network HSM Integration with leading network-based hardware for use with all appliances, chassis, and virtual editions Cloud HSM Integration for high-assurance encryption services fit for the cloud HSM = Hardware Security Module
  • 28. Untrusted Networks Security Services ? Source: Technical Alert 17-318A, National Cybersecurity and Communications Integration Center (NCCIC), November 2017
  • 29. Full proxy SSL Orchestrator Untrusted Networks ! IDS/IPS Malware Sandbox Secure Web GatewayNext-Gen Firewall Data Loss Prevention !
  • 30. SSL Orchestrator Key Use Cases SSL/TLS visibility and orchestration Maximised security investments Risk management and privacy
  • 31. F5 BIG-IP and Symantec DLP F5 BIG-IP and Palo Alto Networks NGFW F5 BIG-IP and FireEye NX
  • 33. Deploy into any environment Offer ease of integration with unique network topologies and security inspection devices Go beyond visibility Provide centralised de- cryption and policy-based traffic steering across multiple security tools Dynamically chain services Remove limitations of daisy-chaining and manual configuration