• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 161
  • Last Modified:

Where to place the SSL Encryption: IIS or Application (SAS) level?

If you had to pick a place for your SSL encryption to go, what would be the best place to place it and why? At the IIS level.....or at the application level?

We use IIS in conjunction with SAS to serve web pages to our external customers in our current environment. We currently are using SSL encryption via IIS, but are wondering if this is the best configuration or if moving forward it would be better to encrypt the web traffic at the SAS Level.

Let me know if you need any additional info. Thank you!
0
nflynn85
Asked:
nflynn85
  • 2
2 Solutions
 
btanExec ConsultantCommented:
SSL is to secure pt to pt channel, it should be at service or system level - in other words, IIS. Application should handle end to end - which is is to encrypt data (preshared or appl specific keypair) and then send thru the secure SSL (certificate) channel. These provides end to end data confidentiality.

Therefore, in your case can explore if the backend server codes can do the data encryption while you maintain the existing IIS' SSL channel. SAS has File encryption for securing data at rest and SSL will be for securing data in transit.
SAS passwords and metadata-bound data sets restrict access to SAS data sets within SAS. But neither can prevent SAS data sets from being viewed at the operating environment system level or from being read by an external program. Encryption provides security of your SAS data outside of SAS by writing to disk the encrypted data that represents the SAS data. The data is decrypted by the SAS system as it is read from the disk, but is not decrypted when read at the operating system level or by external programs.
http://support.sas.com/documentation/cdl/en/lrcon/68089/HTML/default/viewer.htm#n1s7u3pd71rgunn1xuexedikq90f.htm
0
 
nflynn85Author Commented:
That's basically what we are doing now.....EFS for at rest encryption and then IIS for SSL
0
 
btanExec ConsultantCommented:
If that is the case, that will already suffice with secure SSL channel done.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now