12.10: Decrypt Network Traffic at Proxy

CSF v1.1 References:

Group:

Warning icon.

Control is withdrawn in the next version of this control set.

Control Statement

Decrypt all encrypted network traffic at the boundary proxy prior to analyzing the content. However, the organization may use whitelists of allowed sites that can be accessed through the proxy without decrypting the traffic.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]