Encryption at rest: protecting stored data
Encryption in transit: protecting data in motion
TLS configuration and CDA verification
Key Takeaways
TL;DR
Enable full-disk encryption on all devices — BitLocker for Windows, FileVault for macOS.
Use TLS 1.2 or 1.3 for all web traffic and disable TLS 1.0 and 1.1.
Cyber Defense Agent verifies your TLS version, cipher suites, certificate validity, and HSTS configuration in every scan.
Encrypt backups with AES-256 and store encryption keys separately from the encrypted data.
Use Mozilla's SSL Configuration Generator for secure web server TLS settings.
FAQ
Frequently asked questions
Does Cyber Defense Agent check my TLS configuration?
Yes. Every Cyber Defense Agent scan checks your TLS version (verifying TLS 1.2 or 1.3), cipher suite strength, certificate validity and expiration, HSTS header presence, and certificate transparency logging. Issues are flagged in your Cyber Defense Score with specific remediation steps.
Is TLS 1.2 still acceptable or do I need TLS 1.3?
TLS 1.2 is still acceptable and meets all current compliance requirements. TLS 1.3 is preferred because it is faster (fewer handshake round trips) and removes support for legacy vulnerable cipher suites. Ideally, support both TLS 1.2 and 1.3, but disable TLS 1.0 and 1.1 immediately.
What is the difference between encryption at rest and encryption in transit?
Encryption at rest protects stored data — on hard drives, databases, and backups. If someone steals a laptop or accesses a database without authorization, the data is unreadable. Encryption in transit protects data as it moves between systems — browser to server, server to database, email server to email server. Both are required for comprehensive data protection.
Do I need to encrypt internal network traffic?
Yes, especially in a zero trust architecture. Internal traffic between servers, between applications and databases, and between sites should be encrypted using TLS, IPSec, or WireGuard. The assumption that internal networks are safe is exactly what zero trust challenges.
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.