Page 1220 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1220

network switches that support port mirroring, and other types of
               network taps.



                  Monitoring Encrypted Traffic



                  As much as 75 percent of internet traffic is encrypted using
                  Transport Layer Security (TLS) with Hypertext Transfer Protocol
                  Secure (HTTPS), and that number continues to climb every year.
                  While encryption helps ensure privacy of data in transit as it

                  travels over the internet, it also presents challenges for IDPSs.

                  As an example, imagine a user unwittingly establishes a secure
                  HTTPS session with a malicious site. The malicious site then
                  attempts to download malicious code to the user’s system through
                  this channel. Because the malicious code is encrypted, the IDPS
                  cannot examine it, and the code gets through to the client.

                  Similarly, many botnets have used encryption to bypass inspection
                  by an IDPS. When a zombie contacts a command-and-control

                  server, it often establishes an HTTPS session first. It can use this
                  encrypted session to send harvested passwords and other data it
                  has collected and to receive commands from the server for future
                  activity.

                  One solution that many organizations have begun implementing is
                  the use of TLS decryptors, sometimes called SSL decryptors. A TLS
                  decryptor detects TLS traffic, takes steps to decrypt it, and sends

                  the decrypted traffic to an IDPS for inspection. This can be very
                  expensive in terms of processing power, so a TLS decryptor is often
                  a stand-alone hardware appliance dedicated to this function, but it
                  can be within an IDPS solution, a next-generation firewall, or some
                  other appliance. Additionally, it is typically placed inline with the

                  traffic, ensuring that all traffic to and from the internet passes
                  through it.

                  The TLS decryptor detects and intercepts a TLS handshake
                  between an internal client and an internet server. It then
                  establishes two HTTPS sessions. One is between the internal client
                  and the TLS decryptor. The second is between the TLS decryptor
   1215   1216   1217   1218   1219   1220   1221   1222   1223   1224   1225