Files
security-doc/security-guide/source/secure-communication.rst
Alexandra Settle d308a6262d [sec-guide] Edits to the compliance chap
1. Minor editorial changes to the compliance chapter
2. Also creates new 'case studies' folder and moves case
studies into the folder for appropriate reviews.

Change-Id: I3035510a6d66348fdd8ad3e6fce8f2133db7c744
Implements: blueprint sec-guide-overhaul
2017-03-30 15:31:51 +01:00

1.0 KiB

Secure communication

Inter-device communication is a serious security concern. Between large project errors, such as Heartbleed, or more advanced attacks such as BEAST and CRIME, secure methods of communication over a network are becoming more important. It should be remembered, however that encryption should be applied as one part of a larger security strategy. The compromise of an endpoint means that an attacker no longer needs to break the encryption used, but is able to view and manipulate messages as they are processed by the system.

This chapter will review several features around configuring TLS to secure both internal and external resources, and will call out specific categories of systems that should be given specific attention.

secure-communication/introduction-to-ssl-and-tls.rst secure-communication/tls-proxies-and-http-services.rst secure-communication/secure-reference-architectures.rst