TLSv1.3 Inbound Inspection With HSM-Protected Keys
Focus
Focus
What's New in the NetSec Platform

TLSv1.3 Inbound Inspection With HSM-Protected Keys

Table of Contents

TLSv1.3 Inbound Inspection With HSM-Protected Keys

PAN-OS 11.2 supports inbound inspection of TLSv1.3 sessions when private keys are stored on an HSM.
SSL Inbound Inspection decrypts and inspects traffic entering your network for threats before it reaches your internal servers. Organizations, especially in highly regulated industries, often store the private keys for server certificates on hardware security modules (HSMs) for tamper-proof security. However, PAN-OSĀ® 11.1 and earlier versions couldn't perform inbound inspection of TLSv1.3 sessions when private keys resided on an HSM. As a workaround, Next-Generation Firewalls (NGFWs) automatically downgraded TLSv1.3 connections to TLSv1.2. The downgraded connections lacked the security and performance benefits unique to TLSv1.3.
PAN-OS 11.2 resolves this issue by adding support for inbound inspection of TLSv1.3 sessions when private keys are protected by an HSM. After you enable this feature, you can both secure private keys with HSMs and gain full visibility into traffic secured by the latest TLS version. This feature is compatible only with Thales Luna Network HSMs and Entrust nShield HSMs and requires connectivity between your HSMs and virtual or physical NGFWs.