Global Secure Access: TLS Inspection (What Actually Matters)
·804 words·4 mins
Author
Jayden
Table of Contents
Table of Contents
TLS inspection is one of those ideas that sounds completely reasonable right up until you try to turn it on.
On a Zero Trust slide, it’s neat and obvious. In a real environment, it’s where security goals collide with fragile apps, privacy constraints, and the realities of how people actually work.
TLS inspection is not a free security win. You are deliberately inserting a trusted
man-in-the-middle into user traffic, a step that can have broader implications.
In Australia, under the Privacy Act, you’re only allowed to collect personal information if it’s reasonably necessary for your function and collected by lawful and fair means. Blanket TLS inspection struggles here, because decrypting everything inevitably means collecting data you don’t actually need.
If you can’t explain all of this clearly to legal or HR, it’s probably a good idea to stop here.
Dedicated inspection CA (used only for GSA TLS inspection)
Strong key protection and access controls
Short-lived leaf certificates
A documented rotation and incident plan
Gut check:
If you had to rotate the inspection CA in a week due to compromise,
could you do it without breaking the org?
If the answer is no, you’re not ready for broad inspection.
In GSA, TLS inspection is not enabled globally.
It’s deliberately scoped to traffic where decryption gives real security value and low operational risk.
Before enabling TLS inspection for a domain or category, we check what certificate it actually presents.
This catches pinning, unusual chains, and vendors doing “creative” TLS things.