CSI SSL/TLS Modernization Guide
CSI SSL/TLS is a encryption product by CSI International. Explore technical details, modernization strategies, and migration paths below.
Product Overview
CSI SSL/TLS enables SSL/TLS functionality for TCP/IP applications running on zVSE/VSEn.
To secure a TCP/IP application, configure the application to use CSI SSL/TLS libraries.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What is the main purpose of CSI SSL/TLS?
CSI SSL/TLS provides secure communication channels for TCP/IP applications on zVSE/VSEn. It uses industry-standard protocols to encrypt data in transit, protecting sensitive information from eavesdropping and tampering.
What versions of SSL and TLS does CSI SSL/TLS support?
CSI SSL/TLS supports standard TLS versions, including TLS 1.2 and TLS 1.3, as well as older SSL versions for compatibility. The specific versions supported depend on the configuration and the capabilities of the communicating endpoints.
How does CSI SSL/TLS integrate with existing applications?
CSI SSL/TLS integrates with existing TCP/IP applications on zVSE/VSEn. It can be configured to secure specific applications or services, providing a secure communication layer without requiring extensive modifications to the applications themselves.
What type of certificates does CSI SSL/TLS use?
CSI SSL/TLS uses X.509 certificates for authentication and encryption. These certificates are used to verify the identity of the communicating parties and to establish secure communication channels.
Technical
What configuration files are used by CSI SSL/TLS?
CSI SSL/TLS uses configuration files to define the SSL/TLS settings, such as the supported protocols, cipher suites, and certificate locations. These files are typically text-based and can be edited using standard text editors.
What cipher suites are supported by CSI SSL/TLS?
CSI SSL/TLS supports various cipher suites, including AES, DES, and RC4. The specific cipher suites supported depend on the configuration and the capabilities of the communicating endpoints. It is recommended to use strong cipher suites, such as AES, to ensure secure communication.
How does CSI SSL/TLS handle certificate management?
CSI SSL/TLS supports X.509 certificates for authentication. These certificates are used to verify the identity of the communicating parties. The certificates can be self-signed or issued by a trusted certificate authority (CA).
What authentication methods are supported?
CSI SSL/TLS can be configured to use either client-side or server-side authentication. In client-side authentication, the client verifies the identity of the server. In server-side authentication, the server verifies the identity of the client. Mutual authentication, where both client and server verify each other's identities, is also supported.
Business Value
What is the business value of using CSI SSL/TLS?
CSI SSL/TLS enables secure communication for business-critical applications on zVSE/VSEn. By encrypting data in transit, it protects sensitive information from unauthorized access, helping organizations meet regulatory compliance requirements and maintain customer trust.
How does CSI SSL/TLS help with regulatory compliance?
CSI SSL/TLS helps organizations comply with industry regulations, such as PCI DSS and HIPAA, by providing secure communication channels for sensitive data. By implementing strong encryption and authentication, it helps organizations meet the security requirements of these regulations.
How does CSI SSL/TLS protect sensitive data?
CSI SSL/TLS protects sensitive data, such as customer information and financial data, from unauthorized access. By encrypting data in transit, it prevents eavesdropping and tampering, ensuring the confidentiality and integrity of the data.
Security
What authentication methods are supported by CSI SSL/TLS?
CSI SSL/TLS supports various authentication methods, including X.509 certificates. These certificates are used to verify the identity of the communicating parties. The certificates can be self-signed or issued by a trusted certificate authority (CA).
What encryption algorithms are used by CSI SSL/TLS?
CSI SSL/TLS uses strong encryption algorithms, such as AES, to protect data in transit. These algorithms encrypt the data, making it unreadable to unauthorized parties. The specific encryption algorithms used depend on the configuration and the capabilities of the communicating endpoints.
What audit logging capabilities exist?
CSI SSL/TLS provides audit logging capabilities, allowing administrators to track security-related events, such as authentication attempts and certificate changes. These logs can be used to monitor the security of the system and to identify potential security breaches.
How does CSI SSL/TLS control access to resources?
CSI SSL/TLS supports access control mechanisms to restrict access to sensitive resources. These mechanisms allow administrators to define which users or groups have access to specific resources, ensuring that only authorized personnel can access sensitive data.
Operations
What administrative interfaces are available?
CSI SSL/TLS provides administrative interfaces for configuring and managing the SSL/TLS settings. These interfaces allow administrators to define the supported protocols, cipher suites, and certificate locations. The specific interfaces available depend on the product configuration.
What monitoring capabilities exist?
CSI SSL/TLS provides monitoring capabilities, allowing administrators to track the status of the SSL/TLS connections. These capabilities allow administrators to monitor the performance and security of the system and to identify potential issues.
What logging capabilities exist?
CSI SSL/TLS provides logging capabilities, allowing administrators to track security-related events, such as authentication attempts and certificate changes. These logs can be used to monitor the security of the system and to identify potential security breaches.
How does CSI SSL/TLS handle certificate renewal?
CSI SSL/TLS can be configured to automatically renew certificates, ensuring that the certificates are always valid. This helps to prevent disruptions in service due to expired certificates.
Ready to Start Your Migration?
Download our comprehensive migration guide for CSI SSL/TLS or calculate your ROI.