Enterprises are decrypting traffic for security inspection, but it ain't easy. In a blog I posted last week, I described that enterprise organizations are encrypting more of their network traffic. This is a mixed blessing in that it can protect data confidentiality and integrity but it also opens a camouflaged threat vector back into the organization. To address this risk, a majority (87%) of organizations decrypt and then inspect SSL/TLS traffic looking for things like reconnaissance activity, malware, and C2 communications, according to ESG research (note: I am an ESG employee).Yup, over the past five years, many organizations have slowly increased their use of SSL/TLS in homegrown web applications and adopted cloud-based SaaS applications instrumented with Layer 5/6 encryption. As this occurred, security and network professionals followed on, implementing a variety of SSL/TLS decryption and inspection tools on various network segments and multiple locations across global enterprise networks. This resulted in rather haphazard SSL/TLS decryption and inspection performed by an army of technologies and operational processes/procedures. Decrypting/inspecting SSL/TLS traffic has also created a number of challenges for security and networking teams. For example, 26% of security professionals claim that it is difficult to integrate SSL/TLS encryption/decryption technologies with assorted network security packet filtering technologies, 24% say that the networking team is suspicious of any technology that may impact/disrupt the network, and 22% point to collaboration problems between the networking and infosec teams at their organizations.Why are organizations experiencing so many problems? It may be because most firms decrypt and inspect encrypted network traffic on an ad-hoc tactical basis leading to organizational and operational problems. In fact, ESG research found that: 14% of organizations say that they inspect encrypted SSL/TLS traffic tactically by implementing technologies on the network on an ad-hoc or as-needed basis.21% of organizations say that they currently inspect encrypted SSL/TLS traffic tactically by implementing technologies on the network on an ad-hoc or as-needed basis, but they are interested in creating a more comprehensive enterprise strategy in the future.21% of organizations say that they currently inspect encrypted SSL/TLS traffic tactically by implementing technologies on the network on an ad-hoc or as-needed basis, but they are planning on creating a more comprehensive enterprise strategy in the future.24% of organizations say that they currently inspect encrypted SSL/TLS traffic tactically by implementing technologies on the network on an ad-hoc or as-needed basis, but they are in the process of implementing a more comprehensive enterprise strategy in the future.Only 20% of organizations say that they have already implemented a comprehensive enterprise strategy for the inspection of encrypted SSL/TLS traffic.So most organizations are decrypting/inspecting network traffic on a tactical basis today but the trend seems to point toward a more strategic approach in the future. This begs an obvious question: Just what does a comprehensive SSL/TLS decryption and inspection solution and strategy look like? More on this in an upcoming blog. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe