A company has recently implemented an inline security appliance to inspect encrypted traffic. However, there are reports from users that certain legitimate websites are being blocked. Upon investigation, the Network Administrator notices these sites are using certificate pinning. Which action should the company take to ensure that legitimate traffic is not interrupted while maintaining the inspection of other encrypted traffic?
Stop SSL/TLS inspection for all traffic to ensure no legitimate traffic is blocked.
Replace the clients' pinned certificates with the one from the inspection device.
Configure the inspection device to bypass SSL/TLS inspection for sites using certificate pinning.
Instruct users to disable any security features that check for certificate pinning in their web browsers.
|Architecture and Design
|Operations and Incident Response
|Governance, Risk, and Compliance
|Attacks, Threats, and Vulnerabilities