SSL/TLS inspection involves decrypting encrypted network traffic to examine its content for signs of malicious activity. This capability is crucial for detecting threats that use encryption to evade detection, such as phishing, malware, or data exfiltration. After inspection, the traffic is re-encrypted and forwarded to its destination. This mitigation can be implemented through the following measures:
Deploy SSL/TLS Inspection Appliances:
Configure Decryption Policies:
Integrate Threat Intelligence:
Integrate with Security Tools:
Implement Certificate Management:
Monitor and Tune:
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1573 | Encrypted Channel |
SSL/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of malware communication protocols. |
|
.002 | Asymmetric Cryptography |
SSL/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of malware communication protocols. |
||
Enterprise | T1090 | Proxy |
If it is possible to inspect HTTPS traffic, the captures can be analyzed for connections that appear to be domain fronting. |
|
.004 | Domain Fronting |
If it is possible to inspect HTTPS traffic, the captures can be analyzed for connections that appear to be domain fronting. |