With the new Transport Layer Security (TLS) 1.3 specification published by the IETF last August, many organizations are considering adoption plans for the new standard. F5 commissioned a research project with Enterprise Management Associates to better understand how enterprises are adapting to the growing use of encryption overall. While some industry groups have expressed serious reservations over the ability to decrypt and inspect traffic for troubleshooting and possible malware using TLS 1.3, the good news is that a healthy percentage of respondents in the survey are either already in the process of enabling TLS 1.3 or plan to enable it soon. Another good sign is that a clear majority of the respondents in the survey indicated familiarity with TLS 1.3 on a technical level.
Multiple factors have driven the quick adoption plans for the new standard. That major web server and browser vendors have already implemented TLS 1.3 within their products is one. Another is the perceived benefits in improved privacy and end-to-end data security that come with the TLS 1.3 enhancements. Cryptographic protocols like TLS exist to help prevent adversaries from eavesdropping and tampering with data. However, concerns around application security monitoring are giving caution.
The use of encryption over the internet has grown significantly over the last few years. F5 Labs 2017 TLS Telemetry Report notes that 81% of web pages are now loading via HTTPS. While the use of encryption for the data center and enterprise networks increased the most over the last 18 months, enterprises will turn their attention to internally developed applications and web services in the next 18 months.
Given the implications of the TLS 1.3 specification, a clear majority of respondents expressed both operational and security concerns over implementing TLS 1.3 within their organizations. The survey found that 56% of all respondents expressed either some or significant operational concerns, while 61% expressed either some or significant security concerns.

The top security concern was Visibility into Application Security and the Data Center with 57% of respondents indicated the inability to monitor application security was their top concern.

What are they afraid of?
Missing malicious behavior hidden in legitimate traffic. Only 6% were not at all concerned.

Despite those concerns, there is no going back. From a policy perspective, enterprises are clearly mandating the use of transport encryption to protect data, and TLS is the protocol of choice.
To understand how organizations are going to handle TLS 1.3 deployments along with strategies, policies, practices and concerns, access the full TLS 1.3 Adoption in the Enterprise Report here.
About the Author
Related Blog Posts

The everywhere attack surface: EDR in the network is no longer optional
All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.
F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
Volterra and the Power of the Distributed Cloud (Video)
How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.