Informatics

Information about various topics

Ads Here

12.7.17

Is SSL or Data Encryption Required in DMZ or Private network

What is DMZ

The DMZ is an isolated network placed as a buffer area between a company's Trusted Network and the Non-trusted Network. The Internet is always defined as untrusted. By design, the DMZ prevents outside users from gaining direct access to the Trusted Network.

Is SSL or Data Encryption Required in DMZ or Private network

The big problem is that encrypted data needs to be decrypted before being processed by the application logic. This decryption can be done in various devices such as firewalls, load balancers, SSL terminators, web application firewalls, and of course, application backends. The fact that a HTTPS session is terminated before the data arrives at the application backend poses a big issue. That means that if the data is decrypted before reaching the application backend logic, it can be intercepted.

There have been and always will be bad guys who want to hijack the network to get their hands on the data. There are also many other devices such as routers, firewalls, anti-spam filters in the network that can be tampered with or operated by hackers to manipulate communications.

Payload encryption helps when you encounter these issues or need an extra layer of security protection.

Let's imagine that you have an SSL Terminator in your DMZ. The HTTPS traffic is then terminated inside the DMZ at the SSL Terminator. If the data is not encrypted and only HTTPS is in place, the data is in readable form before being sent further inside the private network protected by a firewall. Operators of the firewall can intercept, change or manipulate the data.

It’s important to keep in mind that every device that works with unencrypted data can be manipulated.

Data being decrypted inside a private network

Data being decrypted inside a private network
Allowing unencrypted communication even in private networks can incur severe consequences. It is hard to trust that all employees and contractors will know and do the right things when they have access to company servers and sensitive business information. They can intercept the data if the data are not encrypted. Thus, it is up to responsible people, the Application Business Owner, for example, to define the level of importance of the data and how they want to secure it.

If the data contains information about customers, payment transactions, company strategies or unpublished decisions, the impact is devastating.

To make it short:

Encrypt the payload transmitted from the client
Allow only the application backend to decrypt the data

Data encrypted inside a private network

Data encrypted inside a private network


3 comments: