The use of SSL/TLS in HTTPS provides security for web traffic containing sensitive information. While this is valuable for user privacy, it is useful for cybercriminals as well. Malware is increasingly using HTTPS to hide its command and control communications.
SSL/TLS is a network protocol designed to provide additional security to other, insecure protocols using encryption. It is commonly used in HTTPS for securing web traffic, but the widespread use of HTTPS by malware makes SSL inspection capabilities an essential component of an organization’s cybersecurity strategy.
HyperText Transfer Protocol Secure (HTTPS) is what makes the secure web possible. When browsing the web, any webpage that has the lock icon in the address bar is using HTTPS to communicate between the computer requesting the page and the server where it is stored.
HTTPS is a secure version of the basic HTTP protocol. HTTP is designed to enable browsing the web by defining how a client computer and a webserver should talk to one another.
The main limitation of HTTP is that it is completely insecure. All traffic carried over HTTP is readable to anyone eavesdropping on it. As the web carries more and more sensitive information (due to ecommerce, online health records, social media, etc.), this places users’ sensitive information at risk.
HTTPS uses the Transport Layer Security (TLS) protocol – formerly known as Secure Sockets Layer (SSL) – to add security to HTTP. With SSL/TLS, HTTPS is able to verify the identity of the webserver and encrypt all traffic flowing between the client and the server.
HTTPS is implemented as two protocols working together. SSL/TLS is used to create an encrypted connection between the client and the server. Once this is accomplished, HTTP traffic is sent through this tunnel by encrypting it and embedding it in the data section of SSL/TLS packets. At its destination, the other computer decrypts the data and processes it based on the HTTP protocol.
For this to be possible, the client and server need to have a shared secret key for encryption. SSL/TLS creates this using a handshake protocol where the client and server agree on the parameters to be used for encryption (algorithm, etc.) and share a secret key using asymmetric or public key cryptography to protect it from eavesdropping.
Using SSL/TLS makes HTTPS slower and less efficient than HTTP. However, the protocol offers several important benefits as well, including:
HTTPS is designed to be a secure alternative to HTTP. However, its security has its limitations, including:
The use of SSL/TLS in HTTPS provides security for web traffic containing sensitive information. While this is valuable for user privacy, it is useful for cybercriminals as well. Malware is increasingly using HTTPS to hide its command and control communications.
SSL/TLS inspection involves performing a MitM-style interception on SSL/TLS connections entering or leaving an organization’s network. This enables the organization to inspect the traffic for malicious content.
HTTPS inspection provides several network performance and security benefits, including:
HTTPS inspection requires a next-generation firewall (NGFW) to decrypt a connection, inspect the data that it contains for malicious content, and then encrypt it before forwarding it onto its destination. This can create significant network latency, especially if the NGFW lacks the capacity to perform inspection at line speed.
Deploying a scalable security solution is essential to ensuring that an organization can adapt to increasing traffic bandwidth. A hyperscale network solution enables an organization to add more resources to meet demand without purchasing additional dedicated systems.
HTTPS inspection can dramatically improve an organization’s web security. When selecting and deploying an NGFW for HTTPS inspection, implement the following best practices:
An NGFW should support these capabilities in addition to the other core features described in this NGFW buyer’s guide, including:
Check Point’s NGFWs provide high-performance, scalable SSL/TLS inspection capabilities. To see them in action, you’re welcome to request a free demo.