Security: In the light of TLS 1.3, is it necessary to support TLS 1.2?
I recently overheard some users asking about limiting support to TLS 1.3 because it’s a better standard for security. No doubt it is, but in my opinion, if your websites or web services are targeting a global audience, continuing to support TLS 1.2 is a fair and pragmatic choice. TLS 1.3-only policies are safe when the audience is highly targeted and known—such as employees within an organization.
Older devices and browsers may still rely on TLS 1.2, and by supporting it, you ensure wider compatibility without sacrificing security. TLS 1.2 remains secure as long as it uses modern ciphers like AES or GCM. By deprecating weak ciphers and enforcing strong configurations, you can still avoid vulnerabilities.
Of course, when providing support for TLS 1.2, it’s important to follow a strict security policy:
- TLS 1.3 must be supported in the security configuration.
- TLS 1.0 and TLS 1.1 should not be supported, as they are considered insecure.
A DevOps friend of mine pointed out that major services like AWS recommend TLS 1.2 support by default. For example, CloudFront does not currently offer a TLS 1.3-only security policy, as stated in AWS Documentation.
For an in-depth analysis of an SSL configuration for a domain, you can use this free online service: https://www.ssllabs.com/ssltest/
Comments
Post a Comment