The National Institute of Standards and Technology (NIST) has introduced a new draft practice guide to assist industries such as finance and healthcare in navigating the complexities of monitoring incoming data under the latest internet security protocol, TLS 1.3. While TLS 1.3 offers advanced protection for data transmission over the internet, its implementation poses challenges for the necessary audits and network monitoring required by these sectors. The guide, titled “Addressing Visibility Challenges with TLS 1.3 within the Enterprise” (NIST Special Publication (SP) 1800-37), aims to provide a secure and effective framework for integrating TLS 1.3 into existing security protocols.
Developed through a collaborative effort at the NIST National Cybersecurity Center of Excellence (NCCoE), the guide involved input from technology vendors, industry groups, and participants in the Internet Engineering Task Force (IETF). It proposes technical solutions that enable businesses to secure data transmissions while maintaining compliance with regulatory requirements for data monitoring and cyberattack detection.
Cherilyn Pascoe, director of the NCCoE, highlighted the significance of TLS 1.3 as a crucial encryption tool that not only enhances security but is also compatible with future post-quantum cryptography standards. The project emphasizes the balance between utilizing TLS 1.3 for data protection and fulfilling the auditing and cybersecurity obligations of organizations.
The NIST invites public feedback on the draft guide until April 1, 2024, seeking to refine and improve its recommendations.
TLS, foundational to internet security since its introduction by the IETF in 1996, secures web communications and ensures the confidentiality of sensitive information transmitted over the internet. The transition to TLS 1.3, however, introduced challenges for organizations legally mandated to audit web traffic for security threats, due to changes in key management practices.
The NIST guide outlines six strategies for accessing encryption keys while safeguarding data from unauthorized interception. These methods facilitate the retention of decrypted data for necessary security evaluations, all within a protected internal server environment, thereby addressing the operational and regulatory needs of critical service providers.
Despite the inherent risks of key storage, the guide presents secure alternatives to conventional practices, mitigating potential security vulnerabilities. NCCoE’s Murugiah Souppaya, a contributing author, emphasizes the guide’s role in offering secure key management solutions that comply with TLS 1.3 standards without compromising protocol integrity.
The comprehensive guide will ultimately span five volumes, with the initial two volumes currently available, covering the executive summary and solution implementation. The forthcoming volumes will provide detailed guidance for IT professionals on implementing the solutions and aligning TLS 1.3 visibility architecture with established cybersecurity frameworks for risk and compliance management.
Stay informed with supply chain news on The Supply Chain Report. Free tools for international trade are at ADAMftd.com.
#NIST #TLS13 #Cybersecurity #DataProtection #Healthcare #Finance #DataMonitoring #CyberattackDetection #InternetSecurity #VisibilityChallenges #RegulatoryCompliance #KeyManagement #PostQuantumCryptography #NCCoE #IETF #EncryptionTools #TechSolutions #FeedbackInvitation