Encrypt Network Traffic

From attackics
Revision as of 13:44, 25 September 2020 by Ahahn (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
Encrypt Network Traffic
Mitigation
ID M0808
NIST SP 800-53 Rev. 4 SC-8
IEC 62443-3-3:2013 SR 4.1
IEC 62443-4-2:2019 CR 4.1

Description

Utilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications.


Techniques Addressed by Mitigation

NameUse
Module FirmwareThe encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware.
Network SniffingEnsure that wired and/or wireless traffic is encrypted when feasible. Use best practices for authentication protocols, such as Kerberos, and ensure web traffic that may contain credentials is protected by SSL/TLS.1
System FirmwareThe encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware.
Wireless CompromiseUtilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications.
Wireless SniffingUtilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications. 2