Decryption Why Where and How
Decryption Why Where and How
WHY, WHERE
AND HOW
Palo Alto Networks | Decryption: Why, Where and How | White Paper 1
Why: The Case for Decryption
Internet traffic encrypted with Secure Sockets Layer or Transport Layer Security protocols – SSL and TLS, respectively – is on
an explosive upturn. According to the Google® Transparency Report: “Desktop users load more than half of the pages they view
over HTTPS and spend two-thirds of their time on HTTPS pages.”1
Given the primary benefits of encryption – the private and secure exchange of information over the internet, and compliance
with certain regulations, such as the Health Insurance Portability and Accountability Act and the Payment Card Industry Data
Security Standard, or HIPAA and PCI DSS – the upward trend in SSL adoption is expected to continue. The next major revision
of HTTP 1.1 is HTTP/2, and although the standard itself does not require encryption, most client implementations have stated
they will only support HTTP/2 over TLS, which effectively makes encryption mandatory. Major browsers, including Chrome®,
Firefox®, Safari® and Internet Explorer®, are in various stages of marking HTTP webpages “not secure.”
Encryption is a great means for secure and private
business information exchange, and it is necessary for Upatre Dridex Ehdoor
compliance. However, encrypted traffic is essentially
opaque data that leaves organizations blind to security
threats contained inside. Unfortunately, criminals have
learned to exploit this lack of visibility and identification
to hide from security surveillance within encrypted
traffic and deliver malware. Even legitimate websites
that use SSL can be infected with malware. Moreover,
attackers increasingly use SaaS applications to deliver Steals Transfers Steals sensitive
malware. An attacker can place an infected file in a credentials funds illegally information
legitimate shared folder in an organization’s sanctioned
file storage application, such as Box or Dropbox®, and Figure 1: Examples of malware transferred over encrypted traffic based
from there, the infected file can easily spread to users on Palo Alto Networks Unit 42 threat research
who sync their files with the folder.
Without the ability to decrypt, classify, control and scan SSL-encrypted traffic, it’s impossible for an organization to adequately
protect its business and its valuable data from modern threats. This is where SSL decryption – the ability to decrypt, inspect
and re-encrypt internet traffic before it is sent to its destination – comes into play. Decryption, one of the “10 Things Your Next
Firewall Must Do,” is required for several security-related actions, including threat prevention, advanced malware prevention,
file blocking, data filtering and blocking of malicious webpages.
1. https://transparencyreport.google.com/https/overview?hl=en
Palo Alto Networks | Decryption: Why, Where and How | White Paper 2
Application Delivery Controllers
SSL offload is one of the functions performed by Application Delivery Controllers. An ADC deployment usually requires two
separate boxes – one to decrypt traffic and one to re-encrypt.
The problem with ADC deployments is that traffic travels unencrypted between the ADC devices, meaning rogue IT personnel
or anyone with access to the physical network connecting the devices has easy access to the data. An adversary can simply port
mirror and run a packet capture to retrieve sensitive data in clear text. This undermines the promise of complete confidentiality
that is one of the fundamental purposes of encryption and may also violate compliance laws in some industries and geographies.
SSL Visibility Appliances
SSL visibility appliances decrypt traffic and make it available to all other network security functions that need to inspect it,
such as web proxies, data loss prevention systems and antivirus (see Figure 3).
The problem is that these devices increase capex and opex. In addition to the one-time cost, an SSL visibility appliance
becomes yet another device in the network that needs to be managed, maintained and updated, with a configuration and
rule base entirely different from other security devices. Instead, if one security device is used to decrypt traffic and broker it
to all other complementary devices, there is no need to add SSL visibility appliances.
Encrypted
Unencrypted
AV
2. “Magic Quadrant for Enterprise Network Firewalls,” 10 July 2017 by Adam Hils, Jeremy D’Hoinne, Rajpreet Kaur
Palo Alto Networks | Decryption: Why, Where and How | White Paper 3
NGFWs are the most suitable devices to decrypt traffic, providing several advantages:
1. Decrypted traffic is stored in memory and not sent to other devices. This preserves SSL’s promise of confidentiality and
meets compliance regulations.
2. NGFWs can see and decrypt traffic on all ports, providing visibility into all applications, users, content and threats.
3. By consolidating multiple functions into a single device, an NGFW provides enhanced security. For example, it can
block known threats using vulnerability protection, antivirus and anti-spyware signatures, and by blocking malicious
websites. It can also send new potential threats to the advanced malware analysis environment. If threats are identi-
fied, new protections can be delivered and distributed globally within minutes.
4. An NGFW can broker decrypted traffic to other complementary devices as appropriate, such as for long-term retention
of logs in forensics appliances.
5. NGFWs provide an easy-to-use management interface that reduces complexity and opex. For example, you can
combine applications, users, content, URLs, threat prevention and advanced malware analysis into a single rule.
Palo Alto Networks | Decryption: Why, Where and How | White Paper 4
10. Use hardware crypto acceleration: SSL decryption is very resource-intensive. Your NGFW must use hardware crypto
acceleration to maintain high performance while decrypting traffic.
11. Share threat intelligence and stop threats everywhere based on shared threat intelligence: There are cases when the
traffic is not decrypted on the NGFW, due to privacy concerns or certificate pinning, for example. In these cases, if the
NGFW is part of a platform that acts on threat intelligence gathered from the network, endpoint and cloud, you will
still be able to stop threats, even if the traffic is not decrypted on the network. Let’s say a threat passes through the
network undetected in encrypted traffic and reaches the endpoint. The platform shares threat intelligence between
the network, endpoint and the cloud, and advanced endpoint protection based on this shared intelligence blocks the
threat before the attack succeeds. In addition, information about this threat is shared with the entire platform to make
network and cloud security more intelligent. This is a distinct advantage that an NGFW acting alone cannot provide.
It is best if your NGFW vendor has plans to support the following forward-looking trends, which are likely to become critical:
• HTTP/2: This is a major revision of the HTTP network protocol used by the World Wide Web. It was developed from
the earlier, experimental SPDY protocol, originally developed by Google. Although the standard itself does not require
encryption, most client implementations have stated that they will only support HTTP/2 over TLS, which effectively
makes encryption mandatory.
• TLS 1.3: Having been approved by the Internet Engineering Task Force, TLS 1.3 is expected to make all secure internet
connections faster and safer. Highlights in TLS 1.3 include faster data delivery, removing non-AEAD encryption and
non-PFS key exchange, and dropping renegotiation.
Palo Alto Networks | Decryption: Why, Where and How | White Paper 5
Several teams need to work together:
• Legal/Compliance team to decide what types of traffic can be decrypted.
• Human Resources team to communicate the impact of decryption to everyone who uses your
network, including employees, guests and contractors. In addition, computer usage policies,
People guest sign-in waivers and contractor usage policies must all be updated to stay compliant.
• Security Governance team to manage public key infrastructure, or PKI.
• IT team to install certificates on endpoints as well as manage design and sizing.
• Server team to ensure decryption of inbound traffic destined to web servers.
Successful deployment and analysis of results requires tools for various functions, including:
• Certificate management.
Tools
• Network performance analysis.
• NGFW for decryption policy creation, exclusions, logging and reporting.
3000 Tannery Way © 2018 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found at
Main: +1.408.753.4000 https://www.paloaltonetworks.com/company/trademarks.html. All other
Sales: +1.866.320.4788 marks mentioned herein may be trademarks of their respective companies.
Support: +1.866.898.9087 decryption-why-where-and-how-wp-091918
www.paloaltonetworks.com