SlideShare a Scribd company logo
Paula Musich
Research Director
Enterprise Management Associates
TLS 1.3: Expert Advice to
Modernize Your Security and
Decryption Practices
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Scott Register
VP, Product Management
Ixia, a Keysight business
Watch On-Demand Webinar
• TLS 1.3: Expert Advice to Modernize Your Security and
Decryption Practices On-Demand webinar is available here:
http://info.enterprisemanagement.com/tls-1.3-expert-advice-to-
modernize-your-security-and-decryption-practices-webinar-ws
• Check out upcoming webinars from EMA here:
http://www.enterprisemanagement.com/freeResearch
IT & DATA MANAGEMENT RESEARCH, INDUSTRY
ANALYSIS & CONSULTING3 © 2019 Enterprise Management Associates
Today’s Speakers
Paula Musich, Research Director, EMA
Paula brings over 30 years of experience covering the IT
security and networking technology markets. She has been
an IT security analyst for over nine years, most recently as a
research director at NSS Labs, and earlier as principal
analyst for enterprise security for Current Analysis.
Scott Register, VP, Product Management, Ixia, a Keysight business
Scott has more than 15 years of experience leading product
management operations for global technology companies. He holds
B.S. and M.S. degrees in computer science from Georgia Institute of
Technology and also served as a member of the research faculty.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Paula Musich
Research Director
Enterprise Management Associates
TLS 1.3: Expert Advice to
Modernize Your Security and
Decryption Practices
Introduction and Methodology
TLS 1.3 Finally Debuts
• 10 years in the making
• The benefits:
• Reduced latency
• End-to-end privacy
• Better end-user experience
• The downsides
• Lost visibility for security and
troubleshooting
Methodology
• Surveyed 249 IT pros involved in
security and IT management
• 67% security is primary role
• 40% IT
Director/Manager/Supervisor
• 15% CIO/CTO/VP IT
• 12% CSO/CISO/IT Security
Director
5 © 2019 Enterprise Management Associates
Current State of Encryption
in the Enterprise
Heightened visibility concerns, but no alarm bells
over potentially missed encrypted malware
Slide 7© 2019 Enterprise Management Associates, Inc.
As more network traffic is encrypted, how concerned is your organization that your existing security
monitoring practices/technologies will miss malware hidden in encrypted files?
6%
36%
23%
17%
18%
Not at all concerned
Somewhat concerned
Concerned
Very concerned
Extremely concerned
How Much Traffic Decrypted for Analysis Varies
by Organization Size
TLS 1.3
6%
11%
38%
35%
9%
0%
0%
43%
50%
7%
3%
11%
44%
35%
6%
13%
14%
28%
33%
13%
28%
10%
14%
28%
21%
Don’t know
76%-100%
51%-75%
26%-50%
0%-25%
VL Enterprise Enterprise (All) Midsized SMB Total
Current Decryption Methods
Slide 9© 2019 Enterprise Management Associates, Inc.
25%
23%
18%
16%
15%
3%
1%
0% 5% 10% 15% 20% 25% 30%
Decrypt using a web proxy
Decrypt in an inline security device
Decrypt in an out-of-band security device
Decrypt in inline load balancer
Decrypt using an inline-dedicated decryption device
We are not currently decrypting any of our traffic
Other (Please describe)
Where Encryption is Enabled
TLS 1.3
34%
55%
58%
71%
76%
For internally-developed applications
For web services
For email services
Within the data center
Within the enterprise network
Where, if at all, does your organization intend to implement
encryption over the following timeframes?
4%
3%
5%
11%
34%
44%
4%
2%
4%
14%
30%
45%
7%
3%
3%
17%
29%
40%
4%
2%
2%
14%
29%
49%
6%
2%
4%
10%
29%
50%
We don’t intend to implement additional encryption
2 years or more
19 to 24 months
13 to 18 months
7 to 12 months
0 to 6 months
Total
For internally-developed applications For web services For email services
Within the enterprise network Within the data center
Drivers and Concerns Behind
TLS 1.3 Enablement
13 © 2019 Enterprise Management Associates
Yes, There are Concerns…
Security and Operational Concerns for Enabling TLS 1.3
7%
37%
34%
22%
9%
30%
40%
21%
We are not at all
concerned
We are only slightly
concerned
We have some concerns
We have significant
concerns
Operational concerns Security concerns
14 © 2019 Enterprise Management Associates
Enablement is Moving Full Steam Ahead
The big surprise is that enablement/adoption of TLS 1.3 is moving quickly for inbound
connections and internal traffic
2%
32%
41%
17%
6%
3%
40%
34%
14%
6%
Not planning to enable TLS 1.3
at this time
Already underway
Within 6 months
7-12 months
13-18 months
Inbound connections Internal traffic
Top Motivations for Enabling TLS 1.3
Slide 15© 2019 Enterprise Management Associates, Inc.
67%
73%
44%
55%
52%
51%
50%
Very Important
Improved privacy for end-to-end security Improved data security
Decreased latency/TLS session setup time Better user experience
To be seen as following industry standards Industry moving away from earlier versions
To meet the supplier requirements of our customers
Keeping up with Top Web Server Vendors Comes at
a Cost for Internal Web Application Development
Slide 16© 2019 Enterprise Management Associates, Inc.
Top Three Concerns on Internal Web Application Development Driven by Web
Server Vendor Adoption of TLS 1.3
21%
21%
21%
17%
11%
7%
2%
Increase development lifecycle time/cost
Increase operations lifecycle time/cost
Increase development training time/costs
Increase operations training time/cost
Impact customers' access to goods and services
Impact customer satisfaction
No significant impact
% Total Mentions
How much will it cost to adapt security
architectures to TLS 1.3?
TLS 1.3
4%
13%
27%
35%
17%
4%
0%
17%
25%
42%
17%
0%
2%
10%
25%
42%
18%
4%
10%
16%
30%
22%
16%
5%
29%
10%
24%
10%
19%
10%
Over $1 Million
$501,000 to $1 Million
$251,000 to $500,000
$101,000 to $250,000
$51,000 to $100,000
Less than $50,000
VL Enterprise Enterprise (All) Midsized SMB Total
Strategies for Regaining Visibility
Slide 18© 2019 Enterprise Management Associates, Inc.
How does your organization intend to address the security visibility issue TLS 1.3 caused?
26%
22%
21%
21%
9%
0% 5% 10% 15% 20% 25% 30%
Maintain existing firewalls at earlier versions of TLS for as long as
possible
Look for inline alternatives that enable decryption and
inspection by existing security controls without exacting a
significant performance penalty
Replace existing stateful inspection firewalls with proxy-based
firewalls
Enable decryption and re-encryption on existing inline security
devices and hope that it doesn't add too much latency,
complexity, or security vulnerability
Look for out-of-band decryption solutions that enable decryption
and inspection without exacting a significant performance
penalty
How Different-Sized Organizations Intend to
Approach TLS 1.3 Enablement
Slide 19© 2019 Enterprise Management Associates, Inc.
46%
8%
31%
15%
23%
40%
33%
3%
24%
12%
53%
7%
Enable for all traffic at once
Enable for critical traffic only
Enable for critical traffic first, then other traffic if convenient
Enable only where required for regulatory compliance
SMB Midsized Large Enterprise
Key Findings Summary
• The spreading use of encryption in the enterprise is growing rapidly, but
introduces some concerns over the ability to inspect for malware hidden in
encrypted files
• TLS 1.3 enablement is happening much faster than expected
• There is an apparent disconnect between enablement plans and what’s
required to achieve that while maintaining visibility for troubleshooting and
security monitoring
• Greater education is required to bridge that gap
21© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 21© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
INTRODUCTION TO TLS1.3
22© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ENCRYPTION: THE DOUBLE-EDGED SWORD
• Data visibility is a problem when encrypted –
many devices cannot inspect encrypted data
• Encryption and TLS 1.3 are a good thing
• You will be forced to change your network
• You must set the right expectations for
privacy, security and visibility
Expect improved
privacy*
Expect improved
data security*
Expect improved
user experience*
*Source = Report Summary: TLS 1.3 Adoption In The Enterprise by EMA, 2019
67% 73%
55%
23© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Version Released Deprecated
SSL1.0 1995 (Oops) Immediately
SSL2.0 1995 2011
SSL3.0 1996 2015
TLS1.0 1999 Upcoming
TLS1.1 2006 Upcoming
TLS1.2 2008
TLS1.3 2018
• Encryption is used to secure connections
between web browsers and servers
• Transport Layer Security (TLS) is the new
term for Secure Sockets Layer (SSL), but
the two are often lumped together as “SSL”
• TLS1.3 is the newest encryption standard
• Improves privacy
• Removes old less-secure algorithms
• Big changes for many IT teams
• Decreases setup latency
SSL ENCRYPTION: A QUICK OVERVIEW
24© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Static Keys Ephemeral Keys
One for each client/server pair Session Key New key every session
If you have session key, you can
read all sessions Forward secrecy
Having the key for one session
doesn’t let you see others
OK Privacy Much better
Straightforward Legitimate monitoring Problematic
Can listen passively How to monitor? Must participate in session
Only option up to TLS1.1
What TLS versions?
Optional in TLS1.2
Mandatory in TLS1.3
STATIC VS. EPHEMERAL KEYS
“Session keys” are used to encrypt data in transit.
Older standards used the same “static” key every time for a given client/server.
TLS1.3 requires “ephemeral” keys, new every time.
The Good, The Bad, The Ugly
25© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Monitoring ephemeral key TLS/SSL
• Must be inline
• Must be an active part of the SSL connection
– a “proxy”
• Adds some latency / potential failure point
• Clients must trust SSL inspection device
Monitoring static key TLS/SSL
• Can attach to a Tap or SPAN port
• Stream directly to disk and decrypt later
• No impact on original encrypted connection
• Requires monitoring device to have a copy of
server’s encryption keys
MONITORING WILL BE VERY DIFFERENT WITH TLS1.3
Major Redesign Required
26© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
• Common to have multiple layers of security – firewall, IPS, DLP, etc.
• Bad idea to have each of them do independent encrypt/decrypt
• Much better to have a single SSL proxy provide “decrypt once, inspect many”
service
• Dedicated SSL appliance or Network Packet broker feature
SSL PROXIES AND DEFENSE IN DEPTH
27© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DEPLOYMENT OPTION #1 – APPLIANCE-BASED SSL
• NPBs allow for distribution of encrypted data to decryption devices and then the distribution of the now
unencrypted data to various tools (NGFW, IPS, DLP, etc.)
Firewall Switch ServersBypass
Switch
Network
Packet Broker
Encrypted traffic
SSL Decrypt
IPS
Other tools
Deployment Scenario: Inline
28© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DEPLOYMENT SCENARIO #2 – NPB USING
INTEGRATED SSL
• SSL inspection generates a significant performance overhead on security tools
• An NPB with integrated SSL/TLS decryption capability offloads this burden without impact
Firewall Switch ServersBypass
Switch
Encrypted traffic
Network Packet
Broker
SSL Decrypt
IPS Other toolsDeployment Scenario: Inline
29© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
• Hardware and software solutions for Passive
SSL monitoring (pre-1.3)
• High-performance options for Active SSL
monitoring
• Dedicated hardware acceleration
• Integrated into industry-leading Vision ONE
network packet broker and bypass switches
• Point-and-click UI for management
• Data Masking, NetFlow, Load Balancing, and
other great features built-in
• Test solutions for validating TLS1.3
performance and compliance
IXIA IS HERE TO HELP
We have a range of deployment and performance options
30© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DOWNLOAD FREE WHITEPAPER
https://www.ixiacom.com/resources/report-summary-tls-13-adoption-enterprise
31© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |

More Related Content

PPTX
3 Reasons It's Time for a New Remote Access Model
PDF
Streamline and Secure Your Network and Users
PPT
Information Security Seminar
PPTX
Rise of Ransomware
PPTX
3 Reasons You Need Proactive Protection Against Malware
PPTX
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PDF
Robert Hurlbut - Threat Modeling for Secure Software Design
3 Reasons It's Time for a New Remote Access Model
Streamline and Secure Your Network and Users
Information Security Seminar
Rise of Ransomware
3 Reasons You Need Proactive Protection Against Malware
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Robert Hurlbut - Threat Modeling for Secure Software Design

What's hot (20)

PDF
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
PPTX
Stop Account Takeover Attacks, Right in their Tracks
PDF
Protect Your Data and Apps in the Public Cloud
PDF
CPX 2016 Moti Sagey Security Vendor Landscape
PDF
The State of Automation in Security
PDF
Database monitoring - First and Last Line of Defense
PDF
Next Dimension and Veeam | Solutions for PIPEDA Compliance
PPT
Ironport Data Loss Prevention
PDF
Thinking of choosing Sophos?
PDF
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
PPTX
Should You Be Automating
PPTX
Stop Hackers with Integrated CASB & IDaaS Security
PDF
Top 5 Reasons to Choose Adaptive SSO
PDF
Atelier Technique SYMANTEC ACSS 2018
POT
MOP Product Presentation
PPTX
Cisco 2015 Midyear Security Report Slide Deck
PPT
GDI Product Presentation
PDF
Stop Attacks and Mitigate Risk with Application and Device Control
PDF
Symantec Endpoint Protection
PPTX
Simplifying Security Management in the Virtual Data Center
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
Stop Account Takeover Attacks, Right in their Tracks
Protect Your Data and Apps in the Public Cloud
CPX 2016 Moti Sagey Security Vendor Landscape
The State of Automation in Security
Database monitoring - First and Last Line of Defense
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Ironport Data Loss Prevention
Thinking of choosing Sophos?
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Should You Be Automating
Stop Hackers with Integrated CASB & IDaaS Security
Top 5 Reasons to Choose Adaptive SSO
Atelier Technique SYMANTEC ACSS 2018
MOP Product Presentation
Cisco 2015 Midyear Security Report Slide Deck
GDI Product Presentation
Stop Attacks and Mitigate Risk with Application and Device Control
Symantec Endpoint Protection
Simplifying Security Management in the Virtual Data Center
Ad

Similar to TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices (20)

PDF
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...
PDF
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
PPTX
Where in the world is your Corporate data?
PPT
Auditing in the Cloud
PDF
PDF
safe-software-deployment-how-software-manufacturers-can-ensure-reliability-fo...
PDF
How to Monitor Digital Dependencies Across Your Modern IT Stack
PDF
How to Monitor Digital Dependencies Across Your Modern IT Stack
PDF
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
PPTX
IEEE PHM Cloud Computing
PPT
The bits bytes and business benefits of securing your mq environment and mess...
PDF
Risk management for cloud computing hb final
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PDF
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
PPT
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
DOCX
Sample Discussion 1Security is one of the most important fun.docx
DOCX
Sample Discussion 1Security is one of the most important fun.docx
PPTX
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
PDF
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
Where in the world is your Corporate data?
Auditing in the Cloud
safe-software-deployment-how-software-manufacturers-can-ensure-reliability-fo...
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
IEEE PHM Cloud Computing
The bits bytes and business benefits of securing your mq environment and mess...
Risk management for cloud computing hb final
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
Banking Cores and Clouds in Asia Pacific: understanding Banks Use of Cloud Co...
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ad

More from Enterprise Management Associates (20)

PDF
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
PDF
Enterprise Strategies for Hybrid, Multi-Cloud Networks
PDF
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
PDF
The AI Advantage: How IT Leaders are Redefining Operations in 2025
PDF
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
PDF
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
PDF
Network Observability: Managing Performance Across Hybrid Networks
PDF
Zero Trust Networking: How Network Teams Support Cybersecurity
PDF
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
PDF
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
PDF
Applying Generative AI to IT Operations Research
PPTX
Network as a Service: Understanding the Cloud Consumption Model in Networking
PDF
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
PDF
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
PDF
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
PDF
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
PDF
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
PDF
EMA AIOps Radar: A Guide to Investing in Innovation
PDF
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
PDF
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
Enterprise Strategies for Hybrid, Multi-Cloud Networks
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
The AI Advantage: How IT Leaders are Redefining Operations in 2025
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
Network Observability: Managing Performance Across Hybrid Networks
Zero Trust Networking: How Network Teams Support Cybersecurity
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
Applying Generative AI to IT Operations Research
Network as a Service: Understanding the Cloud Consumption Model in Networking
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
EMA AIOps Radar: A Guide to Investing in Innovation
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectral efficient network and resource selection model in 5G networks
Big Data Technologies - Introduction.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I

TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices

  • 1. Paula Musich Research Director Enterprise Management Associates TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Scott Register VP, Product Management Ixia, a Keysight business
  • 2. Watch On-Demand Webinar • TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices On-Demand webinar is available here: http://info.enterprisemanagement.com/tls-1.3-expert-advice-to- modernize-your-security-and-decryption-practices-webinar-ws • Check out upcoming webinars from EMA here: http://www.enterprisemanagement.com/freeResearch
  • 3. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING3 © 2019 Enterprise Management Associates Today’s Speakers Paula Musich, Research Director, EMA Paula brings over 30 years of experience covering the IT security and networking technology markets. She has been an IT security analyst for over nine years, most recently as a research director at NSS Labs, and earlier as principal analyst for enterprise security for Current Analysis. Scott Register, VP, Product Management, Ixia, a Keysight business Scott has more than 15 years of experience leading product management operations for global technology companies. He holds B.S. and M.S. degrees in computer science from Georgia Institute of Technology and also served as a member of the research faculty.
  • 4. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Paula Musich Research Director Enterprise Management Associates TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
  • 5. Introduction and Methodology TLS 1.3 Finally Debuts • 10 years in the making • The benefits: • Reduced latency • End-to-end privacy • Better end-user experience • The downsides • Lost visibility for security and troubleshooting Methodology • Surveyed 249 IT pros involved in security and IT management • 67% security is primary role • 40% IT Director/Manager/Supervisor • 15% CIO/CTO/VP IT • 12% CSO/CISO/IT Security Director 5 © 2019 Enterprise Management Associates
  • 6. Current State of Encryption in the Enterprise
  • 7. Heightened visibility concerns, but no alarm bells over potentially missed encrypted malware Slide 7© 2019 Enterprise Management Associates, Inc. As more network traffic is encrypted, how concerned is your organization that your existing security monitoring practices/technologies will miss malware hidden in encrypted files? 6% 36% 23% 17% 18% Not at all concerned Somewhat concerned Concerned Very concerned Extremely concerned
  • 8. How Much Traffic Decrypted for Analysis Varies by Organization Size TLS 1.3 6% 11% 38% 35% 9% 0% 0% 43% 50% 7% 3% 11% 44% 35% 6% 13% 14% 28% 33% 13% 28% 10% 14% 28% 21% Don’t know 76%-100% 51%-75% 26%-50% 0%-25% VL Enterprise Enterprise (All) Midsized SMB Total
  • 9. Current Decryption Methods Slide 9© 2019 Enterprise Management Associates, Inc. 25% 23% 18% 16% 15% 3% 1% 0% 5% 10% 15% 20% 25% 30% Decrypt using a web proxy Decrypt in an inline security device Decrypt in an out-of-band security device Decrypt in inline load balancer Decrypt using an inline-dedicated decryption device We are not currently decrypting any of our traffic Other (Please describe)
  • 10. Where Encryption is Enabled TLS 1.3 34% 55% 58% 71% 76% For internally-developed applications For web services For email services Within the data center Within the enterprise network
  • 11. Where, if at all, does your organization intend to implement encryption over the following timeframes? 4% 3% 5% 11% 34% 44% 4% 2% 4% 14% 30% 45% 7% 3% 3% 17% 29% 40% 4% 2% 2% 14% 29% 49% 6% 2% 4% 10% 29% 50% We don’t intend to implement additional encryption 2 years or more 19 to 24 months 13 to 18 months 7 to 12 months 0 to 6 months Total For internally-developed applications For web services For email services Within the enterprise network Within the data center
  • 12. Drivers and Concerns Behind TLS 1.3 Enablement
  • 13. 13 © 2019 Enterprise Management Associates Yes, There are Concerns… Security and Operational Concerns for Enabling TLS 1.3 7% 37% 34% 22% 9% 30% 40% 21% We are not at all concerned We are only slightly concerned We have some concerns We have significant concerns Operational concerns Security concerns
  • 14. 14 © 2019 Enterprise Management Associates Enablement is Moving Full Steam Ahead The big surprise is that enablement/adoption of TLS 1.3 is moving quickly for inbound connections and internal traffic 2% 32% 41% 17% 6% 3% 40% 34% 14% 6% Not planning to enable TLS 1.3 at this time Already underway Within 6 months 7-12 months 13-18 months Inbound connections Internal traffic
  • 15. Top Motivations for Enabling TLS 1.3 Slide 15© 2019 Enterprise Management Associates, Inc. 67% 73% 44% 55% 52% 51% 50% Very Important Improved privacy for end-to-end security Improved data security Decreased latency/TLS session setup time Better user experience To be seen as following industry standards Industry moving away from earlier versions To meet the supplier requirements of our customers
  • 16. Keeping up with Top Web Server Vendors Comes at a Cost for Internal Web Application Development Slide 16© 2019 Enterprise Management Associates, Inc. Top Three Concerns on Internal Web Application Development Driven by Web Server Vendor Adoption of TLS 1.3 21% 21% 21% 17% 11% 7% 2% Increase development lifecycle time/cost Increase operations lifecycle time/cost Increase development training time/costs Increase operations training time/cost Impact customers' access to goods and services Impact customer satisfaction No significant impact % Total Mentions
  • 17. How much will it cost to adapt security architectures to TLS 1.3? TLS 1.3 4% 13% 27% 35% 17% 4% 0% 17% 25% 42% 17% 0% 2% 10% 25% 42% 18% 4% 10% 16% 30% 22% 16% 5% 29% 10% 24% 10% 19% 10% Over $1 Million $501,000 to $1 Million $251,000 to $500,000 $101,000 to $250,000 $51,000 to $100,000 Less than $50,000 VL Enterprise Enterprise (All) Midsized SMB Total
  • 18. Strategies for Regaining Visibility Slide 18© 2019 Enterprise Management Associates, Inc. How does your organization intend to address the security visibility issue TLS 1.3 caused? 26% 22% 21% 21% 9% 0% 5% 10% 15% 20% 25% 30% Maintain existing firewalls at earlier versions of TLS for as long as possible Look for inline alternatives that enable decryption and inspection by existing security controls without exacting a significant performance penalty Replace existing stateful inspection firewalls with proxy-based firewalls Enable decryption and re-encryption on existing inline security devices and hope that it doesn't add too much latency, complexity, or security vulnerability Look for out-of-band decryption solutions that enable decryption and inspection without exacting a significant performance penalty
  • 19. How Different-Sized Organizations Intend to Approach TLS 1.3 Enablement Slide 19© 2019 Enterprise Management Associates, Inc. 46% 8% 31% 15% 23% 40% 33% 3% 24% 12% 53% 7% Enable for all traffic at once Enable for critical traffic only Enable for critical traffic first, then other traffic if convenient Enable only where required for regulatory compliance SMB Midsized Large Enterprise
  • 20. Key Findings Summary • The spreading use of encryption in the enterprise is growing rapidly, but introduces some concerns over the ability to inspect for malware hidden in encrypted files • TLS 1.3 enablement is happening much faster than expected • There is an apparent disconnect between enablement plans and what’s required to achieve that while maintaining visibility for troubleshooting and security monitoring • Greater education is required to bridge that gap
  • 21. 21© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 21© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | INTRODUCTION TO TLS1.3
  • 22. 22© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ENCRYPTION: THE DOUBLE-EDGED SWORD • Data visibility is a problem when encrypted – many devices cannot inspect encrypted data • Encryption and TLS 1.3 are a good thing • You will be forced to change your network • You must set the right expectations for privacy, security and visibility Expect improved privacy* Expect improved data security* Expect improved user experience* *Source = Report Summary: TLS 1.3 Adoption In The Enterprise by EMA, 2019 67% 73% 55%
  • 23. 23© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Version Released Deprecated SSL1.0 1995 (Oops) Immediately SSL2.0 1995 2011 SSL3.0 1996 2015 TLS1.0 1999 Upcoming TLS1.1 2006 Upcoming TLS1.2 2008 TLS1.3 2018 • Encryption is used to secure connections between web browsers and servers • Transport Layer Security (TLS) is the new term for Secure Sockets Layer (SSL), but the two are often lumped together as “SSL” • TLS1.3 is the newest encryption standard • Improves privacy • Removes old less-secure algorithms • Big changes for many IT teams • Decreases setup latency SSL ENCRYPTION: A QUICK OVERVIEW
  • 24. 24© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Static Keys Ephemeral Keys One for each client/server pair Session Key New key every session If you have session key, you can read all sessions Forward secrecy Having the key for one session doesn’t let you see others OK Privacy Much better Straightforward Legitimate monitoring Problematic Can listen passively How to monitor? Must participate in session Only option up to TLS1.1 What TLS versions? Optional in TLS1.2 Mandatory in TLS1.3 STATIC VS. EPHEMERAL KEYS “Session keys” are used to encrypt data in transit. Older standards used the same “static” key every time for a given client/server. TLS1.3 requires “ephemeral” keys, new every time. The Good, The Bad, The Ugly
  • 25. 25© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Monitoring ephemeral key TLS/SSL • Must be inline • Must be an active part of the SSL connection – a “proxy” • Adds some latency / potential failure point • Clients must trust SSL inspection device Monitoring static key TLS/SSL • Can attach to a Tap or SPAN port • Stream directly to disk and decrypt later • No impact on original encrypted connection • Requires monitoring device to have a copy of server’s encryption keys MONITORING WILL BE VERY DIFFERENT WITH TLS1.3 Major Redesign Required
  • 26. 26© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | • Common to have multiple layers of security – firewall, IPS, DLP, etc. • Bad idea to have each of them do independent encrypt/decrypt • Much better to have a single SSL proxy provide “decrypt once, inspect many” service • Dedicated SSL appliance or Network Packet broker feature SSL PROXIES AND DEFENSE IN DEPTH
  • 27. 27© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DEPLOYMENT OPTION #1 – APPLIANCE-BASED SSL • NPBs allow for distribution of encrypted data to decryption devices and then the distribution of the now unencrypted data to various tools (NGFW, IPS, DLP, etc.) Firewall Switch ServersBypass Switch Network Packet Broker Encrypted traffic SSL Decrypt IPS Other tools Deployment Scenario: Inline
  • 28. 28© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DEPLOYMENT SCENARIO #2 – NPB USING INTEGRATED SSL • SSL inspection generates a significant performance overhead on security tools • An NPB with integrated SSL/TLS decryption capability offloads this burden without impact Firewall Switch ServersBypass Switch Encrypted traffic Network Packet Broker SSL Decrypt IPS Other toolsDeployment Scenario: Inline
  • 29. 29© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | • Hardware and software solutions for Passive SSL monitoring (pre-1.3) • High-performance options for Active SSL monitoring • Dedicated hardware acceleration • Integrated into industry-leading Vision ONE network packet broker and bypass switches • Point-and-click UI for management • Data Masking, NetFlow, Load Balancing, and other great features built-in • Test solutions for validating TLS1.3 performance and compliance IXIA IS HERE TO HELP We have a range of deployment and performance options
  • 30. 30© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DOWNLOAD FREE WHITEPAPER https://www.ixiacom.com/resources/report-summary-tls-13-adoption-enterprise
  • 31. 31© 2019 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |