Patent attributes
This disclosure is directed to technologies for identifying and mitigating vulnerable security policies. Using techniques described herein, vulnerable or “weak” ciphers may be identified and updated before the use of the weak security policies and/or weak ciphers cause a disruption in service. A cipher agent may be authorized to monitor the SSL handshake messages which negotiate SSL ciphers and protocols happening from and to a server application. The cipher agent identifies the security policies and/or the ciphers that are utilized by the client application and determines whether the ciphers are weak ciphers. The cipher agent stores security data associated with security policies and ciphers supported by the client device. The cipher agent may store this data in a log, and/or make it available to the client and/or one or more services for further action.