WikiGlossaryTransport Layer Security
Security

Transport Layer Security

Definition

Transport Layer Security, commonly called TLS, is a security protocol used to protect data while it moves between systems, applications, users, and services. It helps ensure that information sent across networks is encrypted in transit, reducing the risk that passwords, session tokens, payment details, customer records, business files, or administrative traffic can be read or altered by an unauthorized party. TLS also supports authentication through digital certificates, allowing a client to verify that it is communicating with the intended server rather than an impostor. In security and compliance programs, TLS is typically treated as a baseline control for protecting network communications, web applications, APIs, email gateways, remote administration portals, internal services, and third-party integrations. Effective TLS management includes using current protocol versions, disabling weak configurations, maintaining valid certificates, reviewing cipher suites, monitoring expiration dates, and documenting where encryption in transit is required. Because TLS depends on configuration quality, organizations should treat it as an ongoing operational control rather than a one-time setup task.

Real-World Examples

Secure customer login

A SaaS business uses TLS to encrypt traffic between users' browsers and its login page so credentials and session cookies are protected in transit.

Protected API integration

A startup or SMB requires TLS for API calls between its application and external payment services to reduce interception and tampering risks.

Internal service encryption

An enterprise encrypts traffic between internal microservices using TLS so sensitive business data remains protected across private network segments.

Certificate lifecycle management

An IT or security team tracks certificate owners, expiration dates, renewal status, and approved TLS settings to avoid outages and weak encryption.

Transport Layer Security is a protocol that encrypts data moving between systems, such as a browser and a website, an application and an API, or two internal services. It helps protect confidentiality, supports server authentication, and reduces the risk of interception or tampering during transmission.

TLS uses a handshake process to establish trust, agree on secure encryption settings, and create session keys for protecting traffic. After the session is established, data exchanged between the parties is encrypted so it cannot be easily read or modified by unauthorized observers.

SSL is the older predecessor to TLS and is generally considered obsolete. TLS is the modern protocol used to secure network communications. People often say SSL when referring to certificates or encrypted web traffic, but secure implementations should use current TLS versions instead of outdated SSL protocols.

TLS is important because many security frameworks and compliance standards expect organizations to protect sensitive information while it is transmitted across networks. TLS helps demonstrate that the organization has implemented encryption in transit, secure configuration practices, and controls to reduce unauthorized disclosure or manipulation of data.

TLS can protect many types of data in transit, including login credentials, session tokens, customer records, payment information, business documents, administrative commands, API payloads, and internal application traffic. It does not protect data after it reaches its destination, so it should be paired with access controls, logging, and encryption at rest where appropriate.

TLS certificates help prove the identity of a server or service and enable encrypted communication. A certificate binds a domain, system, or service identity to a cryptographic key. Proper certificate management helps users and systems avoid connecting to impersonated or untrusted endpoints.

TLS 1.2 can still be secure when configured with strong cipher suites, modern key exchange methods, and weak options disabled. However, organizations should evaluate TLS 1.3 where supported because it simplifies secure configuration, improves handshake performance, and removes several older cryptographic choices.

TLS 1.3 is a newer version designed to improve security and performance. It removes many older algorithms, reduces handshake complexity, and can establish secure sessions faster. TLS 1.2 remains common, but it requires more careful configuration to avoid weak cipher suites or legacy settings.

Organizations should use current TLS versions, disable obsolete protocols, select strong cipher suites, maintain trusted certificates, automate renewal where possible, and regularly scan public and internal endpoints for misconfiguration. They should also define ownership for certificates and document exceptions when legacy systems require special handling.

Auditors commonly look for endpoint scan results, secure configuration standards, certificate inventories, renewal records, architecture diagrams, system configuration screenshots, vulnerability reports, and remediation tickets. The goal is to show that encryption in transit is required, implemented, monitored, and maintained over time.

VersionDateAuthorDescription
1.0.02026-05-07WatchDog GRC TeamInitial publication