Insecure SSL/TLS Protocol - Network Security (2024)

Insecure SSL/TLS Protocol
Using insecure and deprecated protocols can make connections vulnerable to exploits such as DROWN (Decrypting RSA using Obsolete and Weakened eNcryption), which targets a specific weakness in the OpenSSL implementation of SSLv2 protocol, and POODLE (Padding Oracle On Downgraded Legacy Encryption). This vulnerability allows an attacker to read information encrypted with SSLv3 protocol in plain text, using a person-in-the-middle or an eavesdropping attack.
If you use Protocol-SSLv2 and/or Protocol-SSLv3 and/or Protocol-TLSv1 (PCI council requires TLS1.0 to be disabled soon), we highly recommend updating these protocols.
Note: The ELBSecurityPolicy-2016-08 predefined security policy includes Protocol-TLSv1, which is considered insecure.
Rule ID: NS-SSL-001
Risk level: High (not acceptable risk)
Protect against Secure Sockets Layer (SSL) negotiation configuration for SSLv2, SSLv3, and TLSv1.0 insecure / deprecated SSL protocols.
This can help you with the following compliance standards:
This rule can help you form your AWS Well-Architected Framework for seamless integration of AWS, Network Security, and Trend Micro Cloud One - Conformity.

Audit SSL/TLS protocol connection

To determine if you are blocking outdated SSL/TLS protocol connections, perform the following actions:

  1. From the Network Security management interface, click the Policy icon Insecure SSL/TLS Protocol - Network Security (1) in the navigation panel.
  2. Select Intrusion Prevention Filtering.
  3. Search for the following filters to ensure they are enabled. If any are not enabled, then follow steps in the steps to below to enable SSL/TLS protection.
    • SSLv2 = filter 3892
    • SSLv3 = filter 13895
    • TLS 1.0 = filter 13896
    • TLS 1.1 = filter 13897
    • TLS 1.2 or 1.3 = filter 13898
    • TLS 1.3 = filter 13899

Enable SSL/TLS protocol connection protection

To block outdated SSL/TLS protocol connections, perform the following actions:

  1. From the Network Security management interface, click the Policy icon Insecure SSL/TLS Protocol - Network Security (2) in the navigation panel.
  2. Select Intrusion Prevention Filtering.
  3. Search for the following filters, and enable each of them.
    • SSLv2 = filter 3892
    • SSLv3 = filter 13895
    • TLS 1.0 = filter 13896
    • TLS 1.1 = filter 13897
    • TLS 1.2 or 1.3 = filter 13898
    • TLS 1.3 = filter 13899
Insecure SSL/TLS Protocol - Network Security (2024)
Top Articles
Designing A 50 Acre Homestead Layout - The Tiny Life
How to Properly Pawn Your Jewelry
7 C's of Communication | The Effective Communication Checklist
Botanist Workbench Rs3
Hk Jockey Club Result
DL1678 (DAL1678) Delta Historial y rastreo de vuelos - FlightAware
Wild Smile Stapleton
Day Octopus | Hawaii Marine Life
Spelunking The Den Wow
Urban Dictionary Fov
Craigslist Pets Athens Ohio
House Party 2023 Showtimes Near Marcus North Shore Cinema
Magic Mike's Last Dance Showtimes Near Marcus Cedar Creek Cinema
Char-Em Isd
Navy Female Prt Standards 30 34
Where to Find Scavs in Customs in Escape from Tarkov
Edicts Of The Prime Designate
Www.publicsurplus.com Motor Pool
Ubg98.Github.io Unblocked
Kirksey's Mortuary - Birmingham - Alabama - Funeral Homes | Tribute Archive
Homeaccess.stopandshop
Academy Sports Meridian Ms
PCM.daily - Discussion Forum: Classique du Grand Duché
Wisconsin Volleyball Team Boobs Uncensored
25 Best Things to Do in Palermo, Sicily (Italy)
Weldmotor Vehicle.com
Wiseloan Login
Bj타리
8002905511
They Cloned Tyrone Showtimes Near Showbiz Cinemas - Kingwood
Meggen Nut
Little Einsteins Transcript
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
Landing Page Winn Dixie
Autotrader Bmw X5
Walter King Tut Johnson Sentenced
1987 Monte Carlo Ss For Sale Craigslist
Montrose Colorado Sheriff's Department
Puffco Peak 3 Red Flashes
Mvnt Merchant Services
How to Print Tables in R with Examples Using table()
Isabella Duan Ahn Stanford
Disassemble Malm Bed Frame
VDJdb in 2019: database extension, new analysis infrastructure and a T-cell receptor motif compendium
Lesly Center Tiraj Rapid
303-615-0055
Spn 3464 Engine Throttle Actuator 1 Control Command
Spongebob Meme Pic
Compete My Workforce
Deviantart Rwby
The Significance Of The Haitian Revolution Was That It Weegy
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 5600

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.