Encryption Audit

This page provides information on the Encryption Audit in Netify's Network Intelligence Engine. To learn more about our full suite of intelligence drivers, see our intelligence capabilities page.

Risk Overview

Much like locking your front door with an outdated key, relying on legacy TLS versions and weak ciphers may seem secure but leaves you vulnerable to modern decryption attacks. For organizations, continuing to support these obsolete standards creates serious risks to data integrity, regulatory compliance (such as PCI DSS), and defense against Man-in-the-Middle (MitM) attacks.


Indicator Drivers

TLS Cipher Score Driver

To ensure strong data protection, the TLS cipher score driver evaluates cipher suites by grouping them into risk levels based on their exposure to known cryptographic attacks. Ciphers in the critical category, such as those using the broken RC4 stream cipher, are considered fundamentally insecure.

TLS Cipher Score
Tag
tls_cipher_score
Score
Risk severity varies
Version
1.2.0

TLS Version Score Driver

The TLS version score driver assesses the security of connections by categorizing TLS versions into risk levels based on their known vulnerabilities. Older versions like TLS 1.0 and 1.1 are considered weak due to outdated cryptographic methods and lack of support in modern security standards. In contrast, TLS 1.3 represents the strongest option, offering improved performance and enhanced security features.

TLS Version Score
Tag
tls_version_score
Score
Risk severity varies
Version
1.2.0