Skip to content

M1020 SSL/TLS Inspection

SSL/TLS inspection involves decrypting encrypted network traffic to examine its content for signs of malicious activity. This capability is crucial for detecting threats that use encryption to evade detection, such as phishing, malware, or data exfiltration. After inspection, the traffic is re-encrypted and forwarded to its destination. This mitigation can be implemented through the following measures:

Deploy SSL/TLS Inspection Appliances:

  • Implement SSL/TLS inspection solutions to decrypt and inspect encrypted traffic.
  • Ensure appliances are placed at critical network choke points for maximum coverage.

Configure Decryption Policies:

  • Define rules to decrypt traffic for specific applications, ports, or domains.
  • Avoid decrypting sensitive or privacy-related traffic, such as financial or healthcare websites, to comply with regulations.

Integrate Threat Intelligence:

  • Use threat intelligence feeds to correlate inspected traffic with known indicators of compromise (IOCs).

Integrate with Security Tools:

  • Combine SSL/TLS inspection with SIEM and NDR tools to analyze decrypted traffic and generate alerts for suspicious activity.
  • Example Tools: Splunk, Darktrace

Implement Certificate Management:

  • Use trusted internal or third-party certificates for traffic re-encryption after inspection.
  • Regularly update certificate authorities (CAs) to ensure secure re-encryption.

Monitor and Tune:

  • Continuously monitor SSL/TLS inspection logs for anomalies and fine-tune policies to reduce false positives.
Item Value
ID M1020
Version 1.1
Created 06 June 2019
Last Modified 24 December 2024
Navigation Layer View In ATT&CK® Navigator

Techniques Addressed by Mitigation

Domain ID Name Use
enterprise T1573 Encrypted Channel SSL/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of malware communication protocols.
enterprise T1573.002 Asymmetric Cryptography SSL/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of malware communication protocols.
enterprise T1090 Proxy If it is possible to inspect HTTPS traffic, the captures can be analyzed for connections that appear to be domain fronting.
enterprise T1090.004 Domain Fronting If it is possible to inspect HTTPS traffic, the captures can be analyzed for connections that appear to be domain fronting.