Files
security-doc/security-guide/source/secure-communication.rst
Alexandra Settle d308a6262d [sec-guide] Edits to the compliance chap
1. Minor editorial changes to the compliance chapter
2. Also creates new 'case studies' folder and moves case
studies into the folder for appropriate reviews.

Change-Id: I3035510a6d66348fdd8ad3e6fce8f2133db7c744
Implements: blueprint sec-guide-overhaul
2017-03-30 15:31:51 +01:00

27 lines
1.0 KiB
ReStructuredText

====================
Secure communication
====================
Inter-device communication is a serious security concern.
Between large project errors, such as Heartbleed, or more
advanced attacks such as BEAST and CRIME, secure methods of
communication over a network are becoming more important. It should
be remembered, however that encryption should be applied as one part
of a larger security strategy. The compromise of an endpoint means
that an attacker no longer needs to break the encryption used, but
is able to view and manipulate messages as they are processed by
the system.
This chapter will review several features around configuring TLS to
secure both internal and external resources, and will call out
specific categories of systems that should be given specific
attention.
.. toctree::
:maxdepth: 2
secure-communication/introduction-to-ssl-and-tls.rst
secure-communication/tls-proxies-and-http-services.rst
secure-communication/secure-reference-architectures.rst
.. case-studies/secure-communication-case-studies.rst