Security Market Segment LS
Monday, 04 July 2022 11:47

Weak keys and outdated machine identity management undermine TLSv1.3 adoption: report

Venafi vice president of security strategy and threat intelligence Kevin Bocek Venafi vice president of security strategy and threat intelligence Kevin Bocek

A new report suggests insufficient steps have been made in the broad adoption of encryption by top websites.

The report – sponsored by Venafi and prepared by security researcher and TLS expert Scott Helme – looked at the world's top one million sites and found that while some progress has been made, machine identities are not always used in the most effective way.

The good news is that the use of TLSv1.2 has declined by 13% over the last six months, and v1.3 is now used by almost half of the top sites.

This is said to have been driven by digital transformation initiatives, cloud migration, and new cloud-native stacks that default to TLSv1.3.

However, the adoption of TLSv1.3 has not been accompanied by a move to stronger keys for TLS machine identities.

According to the report, industry-standard ECDSA keys are now used by 17% of the top million sites (up from 14% six months ago), with slower and less secure RSA keys still being used by 39% of them.

And the adoption of HTTPS has stalled at 72%.

'The fact that companies are deploying TLS v1.3 with machine identities using RSA keys shows there is still a lot of progress to be made with machine identity management. A strong algorithm means very little if it is used in conjunction with a weak key – it's akin to building a stone fortress but leaving the wooden gate unprotected," explained Helme, who is also the founder of Report URI.

"The adoption of newer, more efficient and more secure EDCSA keys has been negligible over the last six months. This, coupled with the fact that HTTPS adoption has plateaued over the last six months, shows that the internet is no safer than it was half a year ago. Cybercriminals are constantly upping the ante, so it's disheartening to see that companies aren't following suit."

Improvement has also been seen in the number of sites using Certificate Authority Authorization (CAA), which is up 13%.

CAA enables organisations to create a list of approved Certificate Authorities, thus making it harder for attackers to introduce bogus certificates from less-rigorous sources.

"The recent boom in cloud migration means every business needs many more TLS machine identities to secure communication between devices, clouds, software, containers and APIs," said Venafi vice president of security strategy and threat intelligence Kevin Bocek.

"The fact that more and more companies are making use of CAAs is a positive sign that companies are waking up to the need for machine identity management. CAA adoption also underscores the urgent need for a machine identity management control plane that can automate the use of machine identities in increasingly complex cloud environments."

Read 1384 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


Thoughtworks presents XConf Australia, back in-person in three cities, bringing together people who care deeply about software and its impact on the world.

In its fifth year, XConf is our annual technology event created by technologists for technologists.

Participate in a robust agenda of talks as local thought leaders and Thoughtworks technologists share first-hand experiences and exchange new ways to empower teams, deliver quality software and drive innovation for responsible tech.

Explore how at Thoughtworks, we are making tech better, together.

Tickets are now available and all proceeds will be donated to Indigitek, a not-for-profit organisation that aims to create technology employment pathways for First Nations Peoples.

Click the button below to register and get your ticket for the Melbourne, Sydney or Brisbane event



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Stephen Withers

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News