12.10: Decrypt Network Traffic at Proxy

Decrypt all encrypted network traffic at the boundary proxy prior to analyzing the content. However, the organization may use whitelists of allowed sites that can be accessed through the proxy without decrypting the traffic.

Asset Type

Security Function

Implementation Groups

Network

Detect

3

Dependencies

  • Sub-control 2.1: Maintain Inventory of Authorized Software

Inputs

  1. The list of authorized software

  2. The list of authorized sites not requiring decryption before analysis

Operations

  1. Enumerate each boundary proxy system

  2. For each identified proxy system, examine its configuration as follows, noting appropriately and inappropriately configured systems:
    1. Encrypted network traffic is decrypted prior to analysis, when traffic is not related to an authorized site

  3. Enumerate the set of appropriately configured proxy systems

  4. Enumerate the set of inappropriately configured proxy systems

Measures

  • M1 = List of boundary proxy systems

  • M2 = List of appropriately configured boundary proxy systems

  • M3 = List of inappropriately configured boundary proxy systems

  • M4 = Count of boundary proxy systems (count of M1)

  • M5 = Count of appropriately configured boundary proxy systems (count of M2)

  • M6 = Count of inappropriately configured boundary proxy systems (count of M3)

Metrics

Coverage

Metric

The ratio of appropriately configured boundary proxy systems to the total number
of boundary proxy systems

Calculation

M5 / M4