TLS upgrade for Enterprise Cloud

At Thomson Reuters, we prioritize the security of our systems. We protect your sensitive data in the ONESOURCE Determination Enterprise Cloud with a strict security policy.
We made significant updates to our Transport Layer Security (TLS) protocols to improve our security infrastructure.
On
July 23, 2024
, we removed support for certain weak cipher suites used in TLS 1.2. We based this decision on industry recommendations and our internal security governance board to discontinue outdated ciphers.
We are excited to announce the addition of support for TLS 1.3. The latest and safest version of the TLS protocol. TLS 1.3 offers improved security, performance, and privacy over its predecessors.
We understand that these changes may need adjustments on your end. Please review your systems to ensure compatibility with TLS 1.3. Our Thomson Reuters technical support team is available to help you with any questions you have during this transition.
List of TLS 1.2 weak cypher suites to be removed:
  • ECDHE-ECDSA-AES128-GCM-SHA256
  • ECDHE-ECDSA-AES128-SHA
  • ECDHE-RSA-AES128-SHA
  • ECDHE-RSA-AES256-SHA
  • ECDHE-ECDSA-AES256-SHA
  • AES128-GCM-SHA256
  • AES128-SHA256
  • AES256-GCM-SHA384
  • AES256-SHA256
  • AES256-SHA
List of TLS 1.2 weak cypher suites to be removed:
  • TLS_AES_128_GCM_SHA256
  • TLS_AES_256_GCM_SHA384
  • TLS_CHACHA20_POLY1305_SHA256
  • ECDHE-ECDSA-AES128-GCM-SHA256
  • ECDHE-RSA-AES128-GCM-SHA256
  • ECDHE-ECDSA-AES128-SHA256
  • ECDHE-RSA-AES128-SHA256
  • ECDHE-ECDSA-AES256-GCM-SHA384
  • ECDHE-RSA-AES256-GCM-SHA384
  • ECDHE-ECDSA-AES256-SHA384
  • ECDHE-RSA-AES256-SHA384

Related content