Transmission Confidentiality and Integrity
Description
Protect the confidentiality and integrity of transmitted information.
⚠️ Risk Impact
Any unencrypted internal API call is a credential leak waiting to happen. East-west traffic (service-to-service) is often unencrypted on the assumption that 'internal' means 'safe' — an assumption that fails at the first lateral-movement breach.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as critical-severity findings with remediation guidance.
🔧 Remediation
Enforce TLS 1.2+ everywhere. Use mTLS for service-to-service (Istio, Linkerd, Cloudflare Tunnel, Cilium). Disable legacy protocols (TLS 1.0/1.1, SSL). Pin certificates for sensitive paths.
💀 Real-World Attack Scenario
An internal microservice communicated with the database over plaintext within a VPC. An attacker who compromised a pod in the same namespace ran tcpdump and captured database queries — including queries returning SSNs and password hashes. Wire-level eavesdropping bypassed every application-layer access control.
💰 Cost of Non-Compliance
Unencrypted traffic as breach contributor: 18% of 2024 breaches (Mandiant M-Trends). PCI-DSS 4.1: $5K-$100K/month fines + cardholder-data exposure liability.
📋 Audit Questions
- 1.Are all internal connections encrypted? Show the mTLS posture.
- 2.What TLS versions are accepted by load balancers? Any TLS 1.0/1.1?
- 3.How are certificate expirations monitored?
- 4.Is certificate pinning implemented for sensitive paths?
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔External traffic encrypted; internal east-west traffic plaintext
- ⛔TLS 1.0/1.1 left enabled 'for backward compatibility'
- ⛔Certificate expiration monitoring missing — outages traced to expired certs
📈 Business Value
End-to-end encryption eliminates wire-level eavesdropping as an attack class. Strong mTLS for east-west traffic catches lateral-movement attempts.
⏱️ Effort Estimate
40-80 hours service-mesh deployment + per-service migration
EchelonGraph evaluates TLS posture across load balancers + service mesh
🔗 Cross-Framework References
Automate NIST 800-53 SC-8 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →