{"id":28278,"date":"2019-08-30T10:50:35","date_gmt":"2019-08-30T14:50:35","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=28278"},"modified":"2023-07-13T04:09:17","modified_gmt":"2023-07-13T08:09:17","slug":"tls-1-3-network","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/tls-1-3-network\/28278\/","title":{"rendered":"Migrating to TLS 1.3: What are the cybersecurity challenges?"},"content":{"rendered":"<p>Most of the things we do on the internet \u2013 buying things, transferring to a supplier, or sending a confidential email \u2013 rely on transferring data securely. For all of this, we rely on Transport Layer Security (TLS), the protocol that enables the security and privacy of online transactions through encryption.<\/p>\n<p>In August 2018, the most recent version, TLS 1.3, was <a href=\"https:\/\/www.techspot.com\/news\/75956-tls-13-approved-paving-way-safer-faster-internet.html\" target=\"_blank\" rel=\"noopener nofollow\">approved<\/a> as a standard by the Internet Engineering Task Force \u2013 an international community working on the evolution of the internet\u2019s architecture. The adoption has so far been swift. An <a href=\"https:\/\/www.prweb.com\/releases\/new_ema_research_examines_the_adoption_of_tls_1_3_in_the_enterprise\/prweb16067455.htm\" target=\"_blank\" rel=\"noopener nofollow\">Enterprise Management Associates survey found<\/a> that, as of the end of 2018, the majority (73 percent) of enterprises are either already working on enabling the updated protocol for inbound connections, or are planning to do so.<\/p>\n<p>TLS 1.3 was introduced to solve some of the issues seen in the previous version; it\u2019s designed to bring <a href=\"https:\/\/www.ietf.org\/blog\/tls13\/\" target=\"_blank\" rel=\"noopener nofollow\">better performance, privacy and security<\/a> for internet users. However, there\u2019s a fear that the new protocol may have an impact on being able to effectively monitor your organization\u2019s networks.<\/p>\n<h2>Network-based protection before TLS 1.3<\/h2>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/30104133\/tls-1-3-inline-scaled.jpg\"><img decoding=\"async\" class=\"aligncenter wp-image-28286 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/30104133\/tls-1-3-inline-1024x768.jpg\" alt=\"TLS 1.3 Illustation 2\" width=\"1024\" height=\"768\"><\/a><\/p>\n<p>Your company\u2019s network probably includes many different devices like laptops, servers and mobile devices. Each device needs its own endpoint protection. But to protect the entire infrastructure, you need to implement network security solutions at the perimeter. These can be next-generation firewalls or intrusion prevention systems, through to data-leak prevention and deep-packet inspection systems.<\/p>\n<p>These solutions often rely on a man-in-the-middle (MITM) approach. Here\u2019s how it works: a network security device \u2013 known as a middlebox \u2013 acts as an intermediary. It intercepts a request sent from an endpoint, understands what a destination resource is and connects to it. By analyzing the server certificate, the middlebox understands if the resource is legitimate or not. After that, it creates another certificate to communicate back to the client. Once it has both certificates, it then decrypts the previously encrypted traffic to analyze it. To send data back to the server, it encrypts it again to maintain privacy. This process allows the solutions at the perimeter to control what\u2019s happening over the network and prevent <a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/man-in-the-middle-attack-MitM#:~:text=(MiTM)%20attack%3F-,A%20man%2Din%2Dthe%2Dmiddle%20(MiTM)%20attack,communicating%20directly%20with%20each%20other.\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">malware<\/a> downloading or detect intrusions, and \u2013 crucially \u2013 avoid data leaks.<\/p>\n<h2>How TLS 1.3 \u2018breaks\u2019 network security<\/h2>\n<p>TLS 1.3 provides improved security by removing legacy features and delivering stronger standards\u00a0for encryption. But these new features create other risks. For example, it prevents MITM-type attacks when a malefactor intercepts a message, but this makes it impossible for organizations to look into the traffic flowing in and out of the middlebox.<\/p>\n<p>TLS 1.3 encrypts certain values which were sent in unencrypted clear text previously, including messages to establish a connection between the server and client. Most importantly, encryption also touches the certificate message. As a result, middleboxes can\u2019t see the server certificate to understand where the endpoint is trying to connect to and can\u2019t decrypt all the data.<\/p>\n<p>Another issue is eliminating the static key which allows the middlebox to decrypt data. Under TLS 1.3, it\u2019s replaced with a new mechanism of exchanging unique keys for each session established between the endpoint and server. This means that the network security tool can\u2019t decrypt and control the traffic.<\/p>\n<p>So will all middlebox devices become bricks? Not just yet. They can still analyze metadata \u2013 such as packet size or ports that initiate the communication \u2013 which could be indirect indicators of malicious actions, but TLS 1.3 will significantly impact their visibility over the network.<\/p>\n<h2>How to get ready for the shift to TLS 1.3<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-28285 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/30104101\/tls-1-3-header-1024x768.jpg\" alt=\"Migrating to TLS 1.3\" width=\"1024\" height=\"768\">TLS 1.3 is a big step forward. Vulnerabilities in outdated ciphers, which could otherwise be leveraged by cybercriminals, will be removed. Latency will be reduced, making online communications faster and more secure.<\/p>\n<p>TLS 1.3 is already gaining traction, so enterprises need to act now to adapt to the upcoming changes. There\u2019s no silver bullet to replace network monitoring. You need to rethink your enterprise\u2019s approach to protection and focus on areas you may not have paid much attention to before. Here\u2019s what you should do now to protect your business.<\/p>\n<p>As it\u2019s harder to decrypt network traffic, focus more on <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint-product\" target=\"_blank\" rel=\"noopener nofollow\">endpoint-level security<\/a>. Endpoints are the most common entry points for intruders. In addition to indispensable Endpoint Protection Platforms, install an <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr\" target=\"_blank\" rel=\"noopener nofollow\">Endpoint Detection and Response (EDR) solution<\/a> to detect and quickly respond to complex incidents. For visibility over your entire IT infrastructure, it\u2019s essential to monitor logs from endpoints. To deal with this volume, use a solution that can automatically collect and analyze records. EDR allows endpoint data to be stored centrally and provides access to it, which is useful for the post-mortem after an incident has happened.<\/p>\n<h2>Invest in your experts<\/h2>\n<p>But you can\u2019t rely on technical security solutions alone, focus on your team too. Since network detection may become weaker with TLS 1.3, focus more on your response capabilities and provide training to your teams. Access to actionable and regularly updated <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-intelligence\" target=\"_blank\" rel=\"noopener nofollow\">threat intelligence<\/a> can help teams to analyze incidents more quickly and efficiently. If you lack these specialists internally, it is best to outsource this function.<\/p>\n<p>To detect and manage threats effectively, internal security specialists need up-to-date skills and knowledge. Specialist training will help to improve their expertise. <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/security-awareness\" target=\"_blank\" rel=\"noopener nofollow\">Security awareness<\/a> initiatives teach all employees how to avoid putting the company at risk. This helps to reduce the number of incidents caused by what is often the weakest endpoint of all: human error.<\/p>\n<p>TLS 1.3 brings many benefits to end-users and ultimately will help the business too. But you\u2019ll need to double-down your efforts on internal cybersecurity to keep your organization safe to fully embrace its benefits.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>TLS 1.3 is a leap forward in the secure transmission of data. But there\u2019s a few security challenges you need to get ready for.<\/p>\n","protected":false},"author":2515,"featured_media":46222,"template":"","coauthors":[3491],"class_list":{"0":"post-28278","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-infrastructure","7":"emagazine-tag-endpoint-security","8":"emagazine-tag-tls"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/tls-1-3-network\/28278\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/tls-1-3-network\/20342\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/28278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/46222"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=28278"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=28278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}