TLS 1.2 (TLS 1.2)
Why TLS 1.2 Matters
TLS 1.2 is the baseline for secure communication on the modern web. It is the minimum version required by PCI DSS for payment processing and is supported by virtually all clients still in use. While TLS 1.3 is preferred, TLS 1.2 with proper configuration remains secure.
The key to TLS 1.2 security is cipher suite configuration. TLS 1.2 supports both strong and weak cipher suites, and the server's configuration determines which are used. Weak suites like those using RC4, 3DES, or static RSA key exchange should be disabled. Only AEAD ciphers (AES-GCM, ChaCha20-Poly1305) with ECDHE key exchange should be enabled for forward secrecy.
Servers that still support TLS 1.0 or 1.1 should disable them. These versions have known vulnerabilities (BEAST, POODLE) and have been deprecated by all major browsers since 2020. The recommended configuration is TLS 1.2 and TLS 1.3 only, with a curated list of strong cipher suites.
Testing Your Configuration
An SSL checker shows which TLS versions your server accepts and lists the cipher suites offered. Verify that TLS 1.0 and 1.1 are disabled, TLS 1.2 is enabled with strong ciphers only, and ideally TLS 1.3 is also enabled.