Skip to content

Security Test: TLS Protocol Configuration

Description

Default Severity:

TLS configuration issues occur when sensitive data is sent over the network without proper protection, and developers might accidentally leave weak settings in place. This means that although HTTPS is supposed to keep data safe and verify server identity through certificates, bad configurations—like outdated protocols, weak encryption ciphers, or mismanaged certificates—can open the door to attackers. Essentially, if HTTPS isn’t set up correctly, attackers might sniff data or even perform impersonation attacks, making it risky for transmitting credentials or other private information. Developers often overlook the details in setting up the right protocols and checking certificates, leading to vulnerabilities that could be exploited if not fixed.

Reference:

Configuration

Identifier: protocol/tls_configuration_key

Examples

All configuration available:

checks:
  protocol/tls_configuration_key:
    skip: false # default

Compliance and Standards

Standard Value
OWASP API Top 10 API8:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 4.1
GDPR Article-32
SOC2 CC6
PSD2 Article-95
ISO 27001 A.10.1
NIST SP800-52
FedRAMP SC-17
CWE 319
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS Score 7.5