What are the high-level steps for deploying Zscaler TLS inspection in an organization?
A brief walk-through of the recommended phases to rollout TLS inspection.
Wouldn't it be great if we could all just snap our fingers and instantly deploy robust security features/functionality in an organization? Unfortunately, technology just doesn't work that way. Successful execution of a security tool/feature requires careful planning. In today's article, I want to walk through the high-level phases/steps for rolling out SSL (TLS) inspection on Zscaler.
- Step 1: Do the pre-work
- Decrypting TLS traffic can be a sticky subject with privacy and regulatory implications. Before actually implementing the security controls, it's best to get the necessary approvals from leadership/governance.
- This part also includes defining acceptable use policies and making it clear to users what is subject to security inspection.
- Step 2: Implement/define/configure the Certificate Authority
- Depending on final solution architecture, customers can either bring their own CA or leverage the vendor one.
- Either way, all endpoints must trust the Root CA that is being used for TLS inspection.
- Distributing the root certificate might require some additional work (especially on mobility or hardened appliances).
- Step 3: Perform an initial roll-out with selective inspection.
- Start slow. Implement this feature for a sub-set of users (pilot group).
- Only perform inspection on a sub-set of websites and services (like risky URL categories).
- Collect feedback from end users to understand their experience and determine if workflows have been impacted.
- Step 4: Extend the rollout to a broader group.
- Upon transitioning out of step 3, additional scenarios will emerge (e.g. certificate pinning, more complex use cases, etc).
- Expand coverage to include more use cases and groups.
- Step 5: Collect relevant data and reports.
- As the deployment of the feature begins to reach maturity, data is going to be critical.
- At this phase in the rollout, it's very important to leverage reporting capabilities to document inspection coverage and environment support.
- This includes data points to help quantify value like:
- % of traffic being inspected
- Threats captured in encrypted traffic.
- The most common TLS versions and negotiated ciphers
For more information on this topic, check out the following resources:
https://help.zscaler.com/zia/deploying-ssl-inspection
https://help.zscaler.com/zia/choosing-ca-certificate-ssl-inspection
https://help.zscaler.com/zia/adding-custom-certificate-application-specific-trust-store
https://help.zscaler.com/zia/configuring-ssl-inspection-policy