{"id":102804,"date":"2019-10-18T15:35:19","date_gmt":"2019-10-18T22:35:19","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=102804"},"modified":"2019-10-18T15:33:22","modified_gmt":"2019-10-18T22:33:22","slug":"network-ssl-decryption-and-gdpr","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/10\/network-ssl-decryption-and-gdpr\/","title":{"rendered":"SSL\/TLS Decryption Can Help with GDPR Compliance"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">By John Harrison, Regional Product Marketing Manager, EMEA, and Fred Streefland, Regional Chief Security Officer<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You might be surprised to learn that SSL decryption can be a valuable tool for protecting data in compliance with the European Union\u2019s General Data Protection Regulation (GDPR), when applied according to best practices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Responsible organizations everywhere want to protect their networks and the personal data their users entrust to them. As technology develops and regulations shift, it takes insight to implement security measures effectively while remaining in compliance. SSL\/TLS decryption, which provides visibility into security threats that can be hidden within encrypted traffic, has emerged as a key technique for protecting against modern threats. In talking with our customers, however, we\u2019ve found that some organizations believe they aren\u2019t allowed to use SSL decryption because of GDPR, a comprehensive European Union data protection law that governs how entities collect or process the personal data of individuals in the EU.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the contrary, the GDPR is a regulation, not an inhibitor. It states specifically that you are allowed to implement measures in order to secure the processing of personal data. It also goes a step further, recommending you take organizational and technical security measures to secure the processing of personal data. Because of this, it\u2019s not correct to say, \u201cI cannot do SSL decryption because of GDPR.\u201d In fact, it\u2019s more accurate to say, \u201cThe GDPR <\/span><i><span style=\"font-weight: 400;\">requires <\/span><\/i><span style=\"font-weight: 400;\">me to do it.\u201d\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Encryption and Hidden Threats<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Encryption is increasingly used to secure not just sensitive or private information but practically all traffic traversing enterprise networks. According to a Google 2019 finding on encrypted traffic, 87% of internet users\u2019 time is spent on pages that use HTTPS, and 70% of pages are loaded on HTTPS.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The downside is that organizations are essentially left blind to any security threats contained inside encrypted traffic. Attackers exploit this lack of visibility and identification to hide within encrypted traffic and spread malware. The availability of cheap or free certificates from sites such as Let\u2019s Encrypt have made encryption far too simple for attackers to leverage with their automated malware and phishing campaigns. Even legitimate websites that use SSL can be infected with malware. Adversaries inside a network can also use encryption to hide data being exfiltrated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you can\u2019t see what\u2019s coming into your company, you can\u2019t protect it, especially in today\u2019s environment. More than ever, organizations need the ability to decrypt, gain visibility, classify, control and scan SSL-encrypted traffic.<\/span><\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe loading=\"lazy\" width=\"300\" height=\"150\" style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6072898586001\" allowfullscreen=\"allowfullscreen\" webkitallowfullscreen=\"webkitallowfullscreen\" mozallowfullscreen=\"mozallowfullscreen\"><\/iframe><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p><b>A Plan for SSL Decryption and GDPR Compliance<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To implement SSL decryption, you need buy-in within your organization. Part of that involves reassuring stakeholders that you have a plan for rolling out your implementation in a way that remains sensitive to compliance considerations. Your first step should be to set clear expectations around which data you do and don\u2019t want to decrypt. For example, you could inform your board of directors, management and legal counsel that you will not decrypt certain categories of sensitive data, such as data related to health care, banking and government.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another option is not to start SSL decryption of everything on day one. Instead, you could designate certain high-risk categories to focus on, such as recently registered domains, recently infected websites or uncategorized websites. Other good web hygiene options include not allowing users to connect to websites with expired certificates, untrusted certificates or self-signed certificates. These last options can be done even without actually decrypting traffic but can substantially protect users. Then, be sure your technical implementation follows the expectations you set. Palo Alto Networks Next-Generation Firewall, for example, makes it easy to enable an optimal security policy while respecting confidential traffic parameters.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Best Practices for SSL Decryption and GDPR<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To truly protect your organization today, we recommend you implement SSL decryption. Palo Alto Networks has created a set of resources, documentation and <\/span><a href=\"https:\/\/docs.paloaltonetworks.com\/best-practices\/9-0\/decryption-best-practices.html\"><span style=\"font-weight: 400;\">best practice guides<\/span><\/a><span style=\"font-weight: 400;\"> to help. Running a <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/services\/bpa\"><span style=\"font-weight: 400;\">Best Practice Assessment<\/span><\/a><span style=\"font-weight: 400;\"> is one way to get started and strengthen your security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Understand what you need to <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/enabling-ssl-decryption.html\"><span style=\"font-weight: 400;\">enable and deploy SSL decryption<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SSL decryption can be a valuable tool for protecting data in compliance with the European Union\u2019s GDPR, when applied according to best practices.<\/p>\n","protected":false},"author":348,"featured_media":102813,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6765],"tags":[509,2684,810,111,747],"coauthors":[3633,741],"class_list":["post-102804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-enterprise","tag-encryption","tag-gdpr","tag-network-security","tag-ngfw","tag-ssl-decryption","net_sec_category-next-generation-firewalls"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/10\/SSL-Decryption-image-option-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/348"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=102804"}],"version-history":[{"count":8,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102804\/revisions"}],"predecessor-version":[{"id":102812,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102804\/revisions\/102812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/102813"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=102804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=102804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=102804"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=102804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}