New Critical Security Controls Guidelines for SSL/TLS Management A SANS Whitepaper Written by Barbara Filkins Advisor: Stephen Northcutt June 2015 Sponsored by Venafi ©2015 SANS™ Institute Introduction The Internet is built on a foundation of verified trust. Because networks hide the identity of whoever is at the other end of a secure connection, the only way to establish a reasonable level of trust is to place confidence in protected documentation that can act like a passport that confirms an identity or like an immune system that identifies anything from outside the body as untrustworthy. The need for authentication and “A cryptosystem assurance is great and options are few; therefore, we have come to rely on encrypted should be secure even SSL/TLS (Secure Sockets Layer/Transport Layer Security) certificates for almost every if everything about new application, appliance, device and cloud service. Unfortunately, this system can the system, except the key, is public be gamed with bogus certificates. And because threat detection tools such as IDS/IPS, data loss prevention and even next-generation firewalls can’t effectively look inside encrypted traffic to identify threats, sites that accept bogus certificates from users open knowledge.” themselves up to a whole host of exploits their security technologies can’t even see. -Auguste Kerckhoff, This is not a small problem. A series of data breaches, certificate thefts and vulnerabilities 19th century in the technology itself have allowed thousands, perhaps tens of thousands, of genuine certificates to be misappropriated for use as bogus identifications. Despite high-profile scandals over systemic weaknesses, including Heartbleed, POODLE and FREAK, the greatest threat to the security of SSL/TLS certificates appears to be the lax controls most organizations exert over securing keys and certificates. Critical Security Controls Developed through a consortium of U.S. and international agencies and companies, the Critical Security Controls are a relatively small set of prioritized, well-vetted and well-supported security actions that organizations can take to assess and constantly improve their security state. The Council on CyberSecurity, an independent, global nonprofit entity committed to a secure and open Internet, is responsible for stewardship and development of the controls. The actions defined by the controls are a subset of the comprehensive catalog defined by the National Institute of Standards and Technology (NIST) SP 800-53. The controls serve as the basis for immediate high-value action. Standardization and automation are top priorities. Although SSL/TLS is foundational to a whole series of data protection, access and detection controls, managing the keys and certificates behind SSL is becoming increasingly difficult and critical in both IT security and business terms.1 The Ponemon Institute’s 2015 “Cost of Failed Trust Report” estimates that, over the last two years, the number of keys and certificates deployed from web servers to cloud services has grown over 34 percent, to almost 24,000 per enterprise—not counting those used beyond the firewall. This is why the SANS Critical Security Controls, which were transferred to the stewardship of the Council on CyberSecurity in 2013, have been updated to improve SSL/TLS security enforcement rules. This paper will focus on updates and specific recommendations found in Control 17,2 Data Protection, in order to provide practical advice for the management and detection of SSL/TLS security. SANS ANALYST PROGRAM 1 Forrester Research, “Predictions 2015: Data Security and Privacy Are Competitive Differentiators,” Nov. 14, 2014, pp. 1–2. 2 See www.sans.org/critical-security-controls and www.counciloncybersecurity.org/critical-controls 1 New Critical Security Controls Guidelines for SSL/TLS Management The Role of Certificates in SSL/TLS SSL/TLS certificates play a critical role in secure and encrypted communications between a client and a server. First, the server’s certificate, containing its public key, is used by the client to determine whether the client should accept a trust relationship with the server. If the client accepts or validates the authenticity of the server, then the server certificate is used to establish a secure, encrypted channel for the ensuing session. Figure 1 illustrates the SSL/TLS handshake. Figure 1. Primer: SSL/TLS Handshake3 These protocols are not new. SSL became an Internet standard in 1994, with TLS being added soon thereafter.4 Both are constructed around a similar architecture using X.509 certificates. Although there are some differences between SSL and TLS, this document refers to the protocol as SSL/TLS, since the two share a common architecture. SSL/TLS is most often represented as HTTPS, but the protocol can be used to secure any TCP-based application. SSL/TLS is also popular for encrypting traffic between email clients and POP or IMAP servers, setting up secure tunnels between IDS sensors and management consoles, and supporting VPNs as a lower-cost alternative to IPSec. 3 4 SANS ANALYST PROGRAM SANS Sec 401.4, Secure Communications Course Book, pp. 136–137. http://chimera.labs.oreilly.com/books/1230000000545/ch04.html#tls_services 2 New Critical Security Controls Guidelines for SSL/TLS Management The Role of Certificates in SSL/TLS (CONTINUED) When Certs Go Bad Numerous incidents directly related to SSL/TLS have left the security community wondering whether we should be relying on these certificate-based protocols. To determine the answer, it is helpful to understand the major elements behind these incidents and the incidents’ consequences. Trusted certificate authorities are supposed to issue digital certificates only to the owners of the domain names for which certificates are requested. Rogue or fraudulent certificates are used to impersonate legitimate websites, allowing attackers to snoop on Four Key Functions Built Around Trust As critical building blocks for secure e-commerce, SSL/TLS certificates provide: the encrypted communications of users who connect to those sites if their connections are intercepted in transit. The trust essential to SSL/TLS has been repeatedly tested • A uthentication: Verification that the business or organization a user is communicating with really is who it says it is, and not an impostor. in large-scale incidents, including one in 2014, when India’s • C onfidentiality: Secure sessions with a website so that information provided over the Internet by the user cannot be intercepted in transit. the government’s certificates.5 In another case, for seven • I ntegrity: No message alteration without detection. man-in-the-middle (MITM) attacks. •N onrepudiation: Assurance that the sender and recipient of an electronic message or transaction cannot deny sending or receiving the message or engaging in the transaction. governmental certificate authority was compromised, causing Google, Facebook and the Indian government itself to revoke years, DarkHotel spread fraudulent and stolen certificates6 throughout hotel networks, targeting executive guests for On March 23, 2015, Google issued a warning that unauthorized digital certificates were issued for some of its domains. The phony TLS certificates were issued by Egypt- based MCS Holdings, an intermediate certificate authority operating under the China Internet Network Information Center (CNNIC), the Chinese domain registrar and certificate authority. These bogus certs are trusted by all major operating systems and browsers, although a fallback mechanism known as public key pinning prevents Chrome and Firefox browsers from accepting those that vouch for the authenticity of Google properties.7 SANS ANALYST PROGRAM 5 w ww.pcworld.com/article/2452860/digital-certificate-breach-at-indian-authority-also-targeted-yahoo-domains-possibly-others.html 6 http://arstechnica.com/security/2014/11/darkhotel-uses-bogus-crypto-certificates-to-snare-wi-fi-connected-execs/ 7 http://arstechnica.com/security/2015/03/google-warns-of-unauthorized-tls-certificates-trusted-by-almost-all-oses/ 3 New Critical Security Controls Guidelines for SSL/TLS Management The Role of Certificates in SSL/TLS (CONTINUED) Figure 2 shows the major impersonations, compromises and thefts that can result in MITM attacks. The certificate authority (CA) issues the digital certificate. A registration authority (RA) is an entity trusted by the CA to register or vouch for the identity of a user or organization to the CA, focusing on identifying and authenticating users or organizations (usually according to preset standards) to which a certificate will be issued. A CA and an RA can be the same entity. Figure 2. Certificate Compromise8 These examples raise the question of who is in control of the certificate authorities and whether targeted attacks may be the work not of opportunists, but of nation-states perpetrating MITM attacks against foreign countries, foreign citizens and perhaps their own populations. The New Economy: Theft and (Re)Sale of Legitimately Signed Certificates SSL/TLS certificates are designed to establish trust, so those who are able to acquire them illicitly have done the equivalent of faking sincerity. The underground economy has found many ways to monetize data stolen from infected hosts. One way is to resell legitimate signing codes, which then can be used to digitally sign executables and scripts to confirm the software author.9 This could undermine any aspect of the Internet certificate-based community, whether for code-signing or access to an e-commerce site. SANS ANALYST PROGRAM 8 Reprinted from ITL BULLETIN FOR JULY 2012, which can be found at http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf 9 https://isc.sans.edu/diary/Extracting+Digital+Signatures+from+Signed+Malware/15779 4 New Critical Security Controls Guidelines for SSL/TLS Management The Role of Certificates in SSL/TLS (CONTINUED) The resale of stolen digital certificates may be the next major global market for dark-side and cyber warfare teams.10 The 2015 Ponemon report put a black-market dollar value for a stolen, legitimate cert at $1,000. A vulnerability or major breach can easily result in stolen certificates. The Sony breach, for example, resulted in dozens of keys being published to the Internet, some of which may still be valid. SSL: Vulnerable to Attack Over the last year, attacks against specific SSL vulnerabilities have repeatedly made the news. Table 1 lists some of the more infamous exploits and their associated vulnerabilities. Table 1. SSL/TLS Attacks Against Specific Vulnerabilities Name Date Identified Vector Remediation Heartbleed11 4/2014 Exploits vulnerability in OpenSSL that allows attacker on the open Internet to read memory and compromise keys12 Patch vulnerable servers Generate new key pair Install new certificate Revoke old certificate POODLE13 9/2014 Known flaw in SSL v3.0 that allows exploitation of way it ignores padding bytes when running in cipher block chaining (CBC) mode Disable SSLv3.0 on both servers and clients, starting with servers that have highest impact; Upgrade to TLS v1.2, which is not vulnerable FREAK14 3/2015 A vulnerable browser connects to a susceptible web server that accepts “export-grade” encryption Server: Test and configure disable support for TLS export cipher suites as well as other cipher suites that are known to be insecure and enable forward secrecy Client (Browser): Update, patch, maintain secure configuration SANS ANALYST PROGRAM 11 http://heartbleed.com 12 http://arstechnica.com/security/2014/04/private-crypto-keys-are-accessible-to-heartbleed-hackers-new-data-shows/ 13 www.openssl.org/~bodo/ssl-poodle.pdf 14 https://freakattack.com 5 New Critical Security Controls Guidelines for SSL/TLS Management The Role of Certificates in SSL/TLS (CONTINUED) These vulnerabilities have prompted industry to move away from SSL v3.0, preferably to TLS v1.2. Following the NIST declaration that the SSL v3.0 protocol is no longer acceptable for “protection of data due to inherent weaknesses within the protocol,” the PCI Council began work on revising the Data Security Standard (PCI-DSS) and the Payment Application Data Security Standard (PA-DSS), urging organizations to work with their IT departments and/or partners to determine if they are using SSL and identify available options for “upgrading to a strong cryptographic protocol as soon as possible.”15 PCI DSS 3.1, formally released on April 15, 2015, sets a migration date to TLS 1.1 or higher by June 2016.16 System administrators and security teams tend to be complacent toward the internal use of SSL/TLS. A University of Maryland paper published in October 2014, months after the Heartbleed bug became famous in April 2014, showed that well over half of vulnerable websites had not been completely remediated.17 Organizations that don’t keep track of certificates being used on their sites or within their networks can also run into problems. Those that are dependent on browser-based access even to internal systems can find themselves fighting outages caused by expired certificates. Organizations that don’t set and enforce policies on which certificates to accept can find themselves compromised by certificates faked by irresponsible certificate authorities, data thieves or software such as the Superfish adware that reportedly replaced legitimate certificates with fakes that allowed it to hijack web pages and insert advertisements.18 SANS ANALYST PROGRAM 15 h ttp://training.pcisecuritystandards.org/pci-ssc-bulletin-on-impending-revisions-to-pci-dss-pa-dss-assessor?ecid=ACsprvs9qvy TK9zRGYhsuCCz4uQnU3dhH0KUdzmnfcRBQ2yosf8cWGQc80Ij2sfj6TshufCk030H 16 https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1_Summary_of_Changes.pdf 17 www.umdrightnow.umd.edu/news/umd-cyber-experts-discover-lapses-heartbleed-bug-fix 18 www.pcworld.com/article/2886357/lenovo-preinstalls-man-in-the-middle-adware-that-hijacks-https-traffic-on-new-pcs.html 6 New Critical Security Controls Guidelines for SSL/TLS Management Critical Security Controls Guidance Despite the issues with SSL/TLS, a well-configured deployment in a properly patched environment generally does exactly what it’s meant to. Even in a well-configured environment, though, an attacker can take control of an unknown vulnerability. The challenge is both being prepared—hardening, patching and maintaining a secure environment—and never assuming you’re beyond the reach of a determined attacker. CSC 17 Updates The Critical Security Controls version 5.1 for Effective Cyber Defense currently consists of 20 controls that provide an actionable framework for cyber defense. CSC 17, titled, “Data Protection,” defines “the processes and tools used to prevent data exfiltration, mitigate the effects of exfiltrated data and ensure the privacy and integrity of sensitive information.”19 In v5.1, CSC 17 adds requirements for securing keys and certificates, underscoring that protection of that data is best achieved through the application of a combination of encryption, integrity protection and data loss prevention techniques. See Table 2. Table 2. CSC 17 Recommendations for Data Protection20 SANS ANALYST PROGRAM ID# Description Category CSC 17-1 Deploy approved hard drive encryption software to mobile devices and systems that hold sensitive data. Quick win CSC 17-2 (NEW) Verify that cryptographic devices and software are configured to use publicly vetted algorithms. Quick win CSC 17-3 (NEW) Perform an assessment of data to identify sensitive information that requires the application of encryption and integrity controls. Quick win CSC 17-4 (NEW) Review cloud provider security practices for data protection. Quick Win CSC 17-5 Deploy an automated tool on network perimeters that monitors for certain sensitive information (i.e., personally identifiable information), keywords and other document characteristics to discover unauthorized attempts to exfiltrate data across network boundaries and block such transfers while alerting information security personnel. Visibility/ Attribution CSC 17-6 Conduct periodic scans of server machines using automated tools to determine whether sensitive data (e.g., personally identifiable information, health, credit card and classified information) is present on the system in clear text. These tools, which search for patterns that indicate the presence of sensitive information, can help identify if a business or technical process is leaving behind or otherwise leaking sensitive information. Visibility/ Attribution CSC 17-7 Move data between networks using secure, authenticated and encrypted mechanisms. Configuration/ Hygiene 19 www.counciloncybersecurity.org/critical-controls 20 www.counciloncybersecurity.org/critical-controls, pp. 91–92. 7 New Critical Security Controls Guidelines for SSL/TLS Management Critical Security Controls Guidance (CONTINUED) Table 2. CSC 17 Recommendations for Data Protection (CONTINUED) SANS ANALYST PROGRAM ID# Description Category CSC 17-8 If there is no business need for supporting such devices, configure systems so that they will not write data to USB tokens or USB hard drives. If such devices are required, enterprise software should be used that can configure systems to allow only specific USB devices (based on serial number or other unique property) to be accessed, and that can automatically encrypt all data placed on such devices. An inventory of all authorized devices must be maintained. Configuration/ Hygiene CSC 17-9 Use network-based DLP solutions to monitor and control the flow of data within the network. Any anomalies that exceed the normal traffic patterns should be noted and appropriate action taken to address them. Configuration/ Hygiene CSC 17-10 (NEW) Only allow approved Certificate Authorities to issue certificates within the enterprise; review and verify each CA’s Certificate Practices Statement (CPS) and Certificate Policy (CP). Configuration/ Hygiene CSC 17-11 (NEW) Perform an annual review of algorithms and key lengths in use for protection of sensitive data. Configuration/ Hygiene CSC 17-12 Monitor all traffic leaving the organization and detect any unauthorized use of encryption. Attackers often use an encrypted channel to bypass network security devices. Therefore it is essential that organizations be able to detect rogue connections, terminate the connection, and remediate the infected system. Advanced CSC 17-13 Block access to known file transfer and email exfiltration websites. Advanced CSC 17-14 (NEW) Define roles and responsibilities related to management of encryption keys within the enterprise; define processes for life cycle. Advanced CSC 17-15 (NEW) Where applicable, implement Hardware Security Modules (HSMs) for protection of private keys (e.g., for sub CAs) or key encryption keys. 8 New Critical Security Controls Guidelines for SSL/TLS Management Critical Security Controls Guidance (CONTINUED) Almost every category in Control 17 relates in some way to key and certificate management, including the encryption recommendations for mobile and cloud. However, the 5.1 update has several new recommendations related specifically to SSL/ TLS management issues: • CSC 17-2: Verify that cryptographic devices and software are configured to use publicly vetted algorithms. • CSC 17-3: Perform an assessment of data to identify sensitive information that requires the application of encryption and integrity controls. • CSC 17-10: Only allow approved certificate authorities (CAs) to issue certificates within the enterprise; Review and verify each CA’s certificate practices statement (CPS) and certificate policy (CP). • CSC 17-11: Perform an annual review of algorithms and key lengths in use for protection of sensitive data. • CSC 17-14: Define roles and responsibilities related to management of encryption keys within the enterprise; define processes for life cycle. An Actionable Approach Even mid-size organizations have an estimated 10,000 or more possible SSL/TLS certificates. Enterprises with a wide variety of devices, apps and operating systems need to assess the certificates in their environment by asking, “What do I have? How do I manage it? And how can I tell that my management is effective?” Using the CSC methodology to build a strategy around these updates can be the best approach to help your organization address SSL/TLS certificate and key management. Step 1: Assess the Situation and Perform Initial Gap Assessment First, review organizational governance practices related to key and certificate management; knowing the foundational material will help you analyze the results and let you know how to respond to the inevitable surprise: • Do you have an existing data classification and protection policy that calls out the need for encryption and integrity controls? Is that policy actionable and enforceable? (CSC 17-2) • Do you have a good map that shows both the physical network and the possible locations of your sensitive data, including the keys and certificates themselves? (CSC 17-2) • Do you have any existing policies related to key management, such as approved issues or prohibitions across self-signed certificates? (CSC 17-3) SANS ANALYST PROGRAM 9 New Critical Security Controls Guidelines for SSL/TLS Management Critical Security Controls Guidance (CONTINUED) Next build an inventory of existing certificates using certificate-tracking tools that allow automation of the discovery, inspection and monitoring of deployed SSL/TLS certificates. Build an organizational inventory of SSL certificates across your enterprise, delving deep into all platforms to build a complete inventory—servers, workstations, network appliances and devices, mobile, cloud. Your tool should provide detailed certificate reporting that detects the types of certificates (OV, DV, EV, self-signed) from all CAs as well as identifies problems with issuers, key lengths, algorithms and other certificate elements. Review the results to identify gaps to be corrected, risks to be remediated and issues to be managed: • How many SSL/TLS certificates are there in the organization, both on internal networks and in the cloud if using a hybrid or public cloud model? • How many certificate authorities are being used? Are there certs from someone that shouldn’t be in your environment—entities such as CNIC or unapproved issuers such as GoDaddy that are outside of policy? Do you have an extensive use of self-signed certs? • What are the cryptographic algorithms in use? What are the key lengths? • What is the expiration status? How many are current, expiring or expired? (Expired certificates can cause costly problems, as Microsoft found out with a two-day global interruption of Azure services in February 2013.)21 • What adjustments are needed to the governance practices for key and certificate management based on identified gaps, company data use objectives and compliance rules? Step 2: Develop Your Implementation Roadmap Develop your plan to close gaps, remediate risks and address certificate-management issues. Choose which controls should be implemented in each phase of the project; schedule each phase based on business risk considerations. Step 3: Implement the First Steps in Your Plan Implement the first steps of your roadmap. Consider how proposed activities integrate with existing processes and tools. Decide what can be repurposed in your “as is” environment and what new tools, processes and skills may be needed. 21 SANS ANALYST PROGRAM http://azure.microsoft.com/blog/2013/03/01/details-of-the-february-22nd-2013-windows-azure-storage-disruption/ 10 New Critical Security Controls Guidelines for SSL/TLS Management Critical Security Controls Guidance (CONTINUED) Step 4: Integrate CSC 17 Key/Certificate Controls into Operations Integrating the updated or new controls—tools and processes—into your standard operations is a clear priority. Just as important is providing your workforce—both IT and end user—with appropriate training and awareness commensurate with their roles and use of certificates. Step 5: Report and Manage Progress Against Your Implementation Roadmap The CSC methodology provides metrics to evaluate the effectiveness of automation for that control family. CSC 17 metrics relevant to SSL/TLS certificates include ones that can answer these questions: • Does the system store cryptographic key material securely? • Does the system use only NIST-approved encryption algorithms? • Are the systems able to identify the location, department and other critical details about where the sensitive data originated? It is advisable at least once per year to re-evaluate both the algorithms and key sizes you use to ensure that the organization is not falling behind on new vulnerabilities and exploits against its SSL/TLS installations. Schedule periodic scans of certificates to determine if all SSL/TLS certificates remain compliant with your policies, standards and guidelines. Test your detection and reporting capabilities as well as your incident response performance by sending test data sets, both unencrypted and encrypted, across network boundaries from internal systems to ensure that you can detect when something goes amiss and evaluate how long it takes your organization to recover, including the replacement of compromised keys and certificates. Table 3 provides a listing of best practices. SANS ANALYST PROGRAM 11 New Critical Security Controls Guidelines for SSL/TLS Management Critical Security Controls Guidance (CONTINUED) Table 3. Best Practices for SSL/TLS Certificate and Key Management Objective Recommended Activities Establish Governance Ensure key/certificate management practices are reflected in enterprise policies, guidelines and standards (e.g., encryption algorithms, modes of operation, key length and protocols). Classify keys according to enterprise data classification policies and schemas. (CSC 17-2) Define administrative oversight and control procedures that clearly identify who is responsible, accountable and authorized to act regarding certificate management. Establish policies and procedures that require the use of only whitelisted CAs. (CSC 17-10) Develop Actionable Classification and Protection Procedures Around Encrypted Data Develop/maintain network map/inventory of key data sources, sinks and locations, including data not normally visible to end users like certificate stores on servers, workstations, mobile devices. (CSC 17-6) Maintain inventory of what data is cryptographically protected, what OSI layer it resides at or in what data store, and how it is protected (CSC 17‐11). Note: Without all the keys, decrypting inbound SSL/TLS traffic is impossible. Monitor known interfaces, both internally and externally, for abuse. Be able to monitor for anomalies. Know the normal termination points for encrypted tunnels—VPNs. Implement data discovery tools to actively scan and detect sensitive data to determine alignment with policy. (CSC 17-5) (Note: Many tools still have a high false positive rate.) Implement data loss/leak prevention solutions to detect potential data breach/data exfiltration transmissions and prevent them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in motion (network traffic) and at rest (data storage). (CSC 17‐3, CS 17-6) Implement SSL/ TLS Certificate Life Cycle Management Select a centralized key management system that automates certificate life cycle steps: 1) issuance (obtain certificates from trusted CA according to governance policy and standards); 2) inventory (log pertinent information about certificate type, deployment, expiration date, person and department responsible for the management of certificates); 3) refresh (track expiration, replace prior to expiration and verify proper certificate installation; 4) revocation/retirement. (CSC 17-14) Align certificate life cycle management practices with NIST 800-57 and SP 800-52 Revision 1, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Integrate, Deploy, Integrate certificate management deployment with applications and infrastructure and Operate such as delivering SSL/TLS keys and certificates are to an SSL decryption appliance or issuing new SSL/TLS keys to a load balancer. (CSC 17-8, 17-10, 17‐14) Establish reports, alerts and notifications for changes in certificate status from initial/ current inventory baseline. Note: Incorporate change management procedures around new use cases for key/certificates (e.g., inbound SSL/TLS decryption). Establish training programs for both SSL/TLS end users and key/certificate administrators as well as awareness and understanding for both to help identify misuse or possible compromises. Monitor and Respond Monitor certificate-related activity against established policy, standards and the approved SSL/TLS certificate inventory baseline. Test for effectiveness of SSL/TLS key management practices through pre-defined testing (Note: See discussion in Step 5 related to CSC 17 metrics and evaluation recommendations.) Test response to known incidents to evaluate and improve enterprise incident response, breach detection and related processes. SANS ANALYST PROGRAM 12 New Critical Security Controls Guidelines for SSL/TLS Management Conclusion Certificates can be compromised—whether through fraud, theft, vulnerabilities or just plain complacency. Nonetheless, proper hygiene, attention to maintenance and management can resolve most security issues related to SSL/TLS, similar in many ways to best practices for password management. The key to keeping SSL/TLS transactions secure is to stay aware, keep current and be prepared to take action quickly to contain and recover from an incident. A vital tool for this is the Critical Security Controls, a relatively small number of highly focused recommendations for practical, effective actions for getting out of trouble simply by following instructions. The actions involving SSL/TLS key and certificate management amount to a ready-made methodology for the orderly establishment, application, operationalization and evaluation of related processes. Feedback mechanisms report on the real-world efficacy of both the recommended actions and the tools involved. Combine SSL/TLS key and certificate management best practices with other data protection controls such as encryption and data loss prevention. Keep the management of keys and certificates current and aligned with new operational standards, not just in cryptology, but in other processes covered by the controls, such as identity and access management (CSC 15), user activity management (CSC 16), and incident response (CSC 18), as well as more traditional areas of network security. SANS ANALYST PROGRAM 13 New Critical Security Controls Guidelines for SSL/TLS Management About the Author Barb Filkins, a senior SANS analyst who holds the CISSP and SANS GSEC (Gold), GCH (Gold), GLSC (Gold), and GCPM (Silver) certifications, has done extensive work in system procurement, vendor selection and vendor negotiations as a systems engineering and infrastructure design consultant. She is deeply involved with HIPAA security issues in the health and human services industry, with clients ranging from federal agencies (DoD and VA) to municipalities and commercial businesses. She focuses on issues related to automation—privacy, identity theft and exposure to fraud, as well as the legal aspects of enforcing information security in today’s mobile and cloud environments. Sponsor SANS would like to thank its sponsor: SANS ANALYST PROGRAM 19 New Critical Security Controls Guidelines for SSL/TLS Management
© Copyright 2026 Paperzz