Encryption Audit
This page provides information on the Encryption Audit in Netify's Network Intelligence Engine. To learn more about our full suite of intelligence drivers, see our intelligence capabilities page.
Risk Overview
Much like locking your front door with an outdated key, relying on legacy TLS versions and weak ciphers may seem secure but leaves you vulnerable to modern decryption attacks. For organizations, continuing to support these obsolete standards creates serious risks to data integrity, regulatory compliance (such as PCI DSS), and defense against Man-in-the-Middle (MitM) attacks.
Indicator Drivers
TLS Cipher Score Driver
To ensure strong data protection, the TLS cipher score driver evaluates cipher suites by grouping them into risk levels based on their exposure to known cryptographic attacks. Ciphers in the critical category, such as those using the broken RC4 stream cipher, are considered fundamentally insecure.
- Tag
- tls_cipher_score
- Score
- Risk severity varies
- Version
- 1.2.0
TLS Version Score Driver
The TLS version score driver assesses the security of connections by categorizing TLS versions into risk levels based on their known vulnerabilities. Older versions like TLS 1.0 and 1.1 are considered weak due to outdated cryptographic methods and lack of support in modern security standards. In contrast, TLS 1.3 represents the strongest option, offering improved performance and enhanced security features.
- Tag
- tls_version_score
- Score
- Risk severity varies
- Version
- 1.2.0