Secure Sockets Layer/Transport Layer Security (SSL/TLS) is the network protocol that encrypts and authenticates most network traffic. It’s the difference between HTTP and HTTPS web browsing and is used to protect sensitive information traveling over the network, such as login credentials or credit card data.
However, SSL/TLS can also be used to conceal malicious content in web traffic. TLS inspection involves unwrapping SSL/TLS from web traffic to search for malware, data exfiltration, and other potential threats.
In recent years, the proportion of Internet traffic using encrypted HTTPS has grown dramatically, providing significant privacy and security benefits. However, one of the swiftest-growing types of encrypted traffic is malicious traffic, which uses SSL/TLS to hide from network security tools.
TLS inspection is necessary to identify malware command and control (C2) traffic, attempted data exfiltration, and other malicious traffic on a company’s network. By stripping away the protection provided by SSL/TLS, corporate network security solutions can identify and block threats at the network level.
SSL/TLS securely encrypts network traffic, making it impossible to eavesdrop upon it. To enable TLS inspection, many companies will set up a web proxy with a wildcard digital certificate. Each company-owned computer will be configured to trust that digital certificate to authenticate for any website on the Internet.
When a user attempts to browse a website, the proxy server will receive the request and create an SSL/TLS encrypted connection between itself and the client using the wildcard certificate. It will then create its connection to the requested website. Data flowing between the client and server will flow over one encrypted connection, be decrypted by the proxy server, and then re-encrypted and flow over the other encrypted connection to its destination.
By decrypting traffic en route, the proxy server can read the content of the web traffic. This enables it to identify malicious content in the traffic even though it is an encrypted SSL/TLS connection.
TLS inspection provides a few benefits for an organization, including:
TLS inspection has its benefits, but it can also have performance impacts on network traffic. TLS inspection adds additional steps that a device must perform before routing a network packet toward its destination.
With TLS inspection, a device must decrypt the traffic, inspect it for threats, and re-encrypt it before sending it on its way. All of these steps take time and resources and create network latency, especially when being performed at line speed on high-bandwidth network connections.
Some best practices for configuring TLS inspection include the following:
TLS inspection is a core capability of a next-generation firewall (NGFW). Without this functionality, an NGFW lacks the visibility necessary to apply its other built-in security functions, such as URL filtering, intrusion prevention systems (IPS), access control, and more. Learn more about what to look for in an NGFW in this NGFW buyer’s guide.
Check Point Quantum offers TLS inspection while minimizing network latency and performance impacts. Find out more about its capabilities in Miercom’s 2024 NGFW Security Benchmark. Then, see what it can do for yourself by signing up for a free demo.