>With that said, when was an important network security function implemented that wasn't a complete pain to put into place?
Cisco Umbrella is usually trivial and easy to implement. It uses DNS to block known bad domains, and use a transparent proxy to scan the content of "grey" domains.
https://umbrella.cisco.com/products/features/intelligent-proxy
I've learnt over many years that hard difficult to implement security technology usually lets you down due to human failures. Simplicity is king. I've seen this a million times - "x" isn't working - can you bypass "x" from the security.
>Are you willing to let your users see whatever embedded videos they want to see on their favorite sites?
We use content filtering only to block known malware and general "bad" sites. We don't have any other filters enabled such as blocking porn or embedded videos at work. Everyone is expected to be a professional and strive for professional standards. Everyone also knows we have detailed analytics enabled in the Meraki Dashboard. It would stand out.
We've never had a problem. To be honest, it would probably be more of an embarassment for someone at my work being caught out like this and an disiciplinary issue.
>if you have invested in an endpoint AV strategy that has a high enough success rate to keep you from allowing a big malware problem into your network
I'm feeling pretty confident in this area to be honest. I wouldn't use an AV platform unless I was confident. Nearly everyone at my work uses a notebook - because they are expected to be mobile workers. Having TLS inspection at just the office on its own doesn't adequatly address the overall risk.
It's probably one of the reasons we are not so worried about content filtering at work. If someone wanted to use something dubious they could just do it when they were working at a clients office, at home, while on 4G (all our notebooks havew 4G built in and enabled), or in a cafe (where I am right now).
Our AV platform also has similar security content filtering categories as configured in our Meraki network. Users get a similar experience everywhere they are working.
We also have our systems patched right up to date. All our platforms use a supported and modern OS.
>Without full inspection, that's what you're going to allow unless you're running a straight whitelisting strategy.
That simply is not true. The initial HTTPS handshake includes the DNS name you are trying to connect to in clear text. This is how content filtering can block access to categories, even though they are using HTTPS.
>In summary, no one is a fan of implementing deep packet inspection, but sticking your head into the mud won't keep your business from suffering from the lack of a proper security strategy for your entire attack surface.
Touche. I believe continuing to push the line of using deep packet inspection for TLS, a technology from the 00's, is an "old school" way of thinking. Security strategy has moved beyond this technology using methods I have already given - security monitoring, endpoint protection, DNS inspection (such as using Umbrella and MX), end user education, using modern supported OSs and regular patching of known security issues.
If you are a bit stuck - you can use the last sentence above for your new security policy. I promise you - you'll be much safer with this than using TLS inspection. 🙂