1–2 minutes

Reading Time

Cybersecurity Chunks: SSL Inspection


HTTPS protects web traffic with encryption; however, it also introduces risk as attackers may try utilizing the encryption aspect to get around your network’s defenses.

Even when connecting to a trusted source and establishing a secure SSL session, the accessed resource may host a virus or other malicious software. Without any further inspection, these threats may be cloaked by the encryption provided by SSL, pass through your defenses undetected, and end up in your network and on your devices!

Malicious software can be obscured by SSL/TLS-encrypted web traffic

SSL inspection is a technique used to inspect encrypted traffic. Two common methods include:

Certificate Inspection is used only with web filtering. It looks at the SSL/TLS handshake and verifies the identity of a web server.

Deep Inspection is used with all types of security scanning. It will decrypt incoming traffic to inspect and, if safe, re-encrypts and sends it to the recipient. Deep inspection also protects against attacks leveraging other secure protocols such as SMTPS, POP3S, IMAPS, and FTPS.

E.g. Deep Inspection

SSL Inspection methods may give rise to certificate warnings as your intermediary security device re-encrypts traffic with a self-signed certificate – appearing as a MitM attack.

Intermediary devices performing SSL Inspection may cause certificate warnings to show in your browser

To avoid this: Download and install your vendor’s CA_SSL certificate on all workstations as a trusted root authority or Use a CA-Issued SSL certificate.

A more in-depth article on SSL Inspection can be found here.

~ G.G. May 2024

More Articles:


Leave a comment

Join 3,933 other subscribers
No comments on Cybersecurity Chunks: SSL Inspection