Transport Layer Security (TLS) is a critical protocol for protecting data in transit and includes multiple options for authentication within implementations. In recent discussions, it became clear that additional information could be helpful, breaking down what a user or administrator needs to understand about TLS implementation and configuration options to better assess points of potential exposure. As such, this blog is aimed at filling that gap. The configuration options listed tie into policy for an organization and can assist in discussions between the security and policy stakeholders in an organization.
Understanding Points of Exposure
In designing secure systems, understanding TLS termination points is crucial. These points, where encryption ends and data becomes vulnerable, are inherent in TLS sessions. However, misconfigurations or unexpected interceptions can lead to data exposure. This discussion focuses on the risks tied to different TLS deployment strategies, especially for securing web applications via HTTP.
We will examine how TLS secures direct application layer traffic and establishes encrypted tunnels (ZTNA, VPNs), highlighting the termination points that impact data security. Furthermore, we'll address new TLS features for web sessions, emphasizing their configuration's role in aligning with organizational security policies. The table below offers a practical guide to various deployment scenarios and their associated termination points, empowering security teams to make informed policy decisions.
Configuration or Deployment Option |
Endpoints for setting (server/client) |
Potential points of exposure with setting option selected |
Description/Advantages |
TLS with Encrypted Client Hello (ECH) Enabled |
CDN/Client |
Client-CDN |
Privacy-focused; limits middlebox access. |
TLS with Encrypted client Hello (ECH) Disabled |
CDN/Client |
CDN-Client |
Allows middlebox filtering based on SNI. |
User VPN Service |
User/VPN Service |
User-VPN |
Anonymizes user; hides browsing history. |
Zero Trust Network Access (ZTNA) |
Client/App Server |
Client-Server |
Dedicated app access; prevents lateral movement. |
Corporate VPN Service |
Client/VPN Server |
VPN Server |
Network-wide access; risk of lateral movement. within corporate infrastructure. |
Interception for Monitoring (e.g. IPS) |
Client/Server |
Client/Server/Middlebox |
Network traffic visibility for intrusion detection. |
Proxy Service Interception |
Client/Proxy |
Client/Proxy |
Proxy decrypts/inspects traffic; new session initiated to server. |