• Home
  • CodeSent for Apigee
    • Features
    • Rules
    • API
  • Demo
  • Pricing
  • Blog
  • Contacts
  • Sign in
  • Get a demo
    • Home
    • CodeSent for Apigee
      • Features
      • Rules
      • API
    • Demo
    • Pricing
    • Blog
    • Contacts
  • Sign in
  • Get a demo
  1. Rules
  2. No TLS protocol specified in connection definition

No TLS protocol specified in connection definition

Severity
High
Tags
Data in Transit
Applies to
ServiceCallout MessageLogging Target
Links
CWE-327
Why This Issue Is ImportantHow This Issue Is DetectedHow to Fix the Issue

Why This Issue Is Important

When the protocols for connecting to a target system are not explicitly specified in an Apigee proxy, there is a risk that insecure protocols, such as SSLv3, might be used. SSLv3 and other outdated protocols are vulnerable to various security threats, including the POODLE attack, which can compromise the security of the communication channel between Apigee and the target system. If insecure protocols are used, the data transmitted could be intercepted, altered, or exposed to unauthorized parties through Man-in-the-Middle (MITM) attacks, leading to a significant breach of data confidentiality and integrity.

To ensure secure communication, it is essential to specify the use of strong, modern protocols such as TLSv1.2 or TLSv1.3. Failing to do so violates security requirements that mandate the use of established secure communication protocols and industrial-strength encryption techniques to protect sensitive data during transmission.

How This Issue Is Detected

CodeSent detects this issue by analyzing the target system configuration within the proxy to check whether the TLS protocol is explicitly specified

How to Fix the Issue

To fix this issue, you should explicitly specify the TLS version in the target system configuration to ensure that only secure protocols are used.

<HTTPTargetConnection>
    <SSLInfo>
        ...
        <Protocols>
            <Protocol>TLSv1.2</Protocol>
        </Protocols>
        ...
    </SSLInfo>
</HTTPTargetConnection>
Back to Rules

Sentinel Strength for Secure API Gateway Code

  • ​Home
  • Features
  • Demo
  • Rules
  • Blog
  • Apigee Best Security Practices
  • Contact us

  • ​+381 637 736 053 ​
  • ​info@codesent.io
Socials
​
Copyright © CodeSent
Apigee is a registered trademark of Google LLC

We use cookies to provide you a better user experience on this website. Cookie Policy

Only essentials I agree