Skip to content

Latest commit

 

History

History
25 lines (21 loc) · 2.19 KB

insecure-cloudfront-protocols.md

File metadata and controls

25 lines (21 loc) · 2.19 KB

CloudSploit

AWS / CloudFront / Insecure CloudFront Protocols

Quick Info

Plugin Title Insecure CloudFront Protocols
Cloud AWS
Category CloudFront
Description Detects the use of insecure HTTPS SSL/TLS protocols for use with HTTPS traffic between viewers and CloudFront
More Info CloudFront supports SSLv3 and TLSv1 protocols for use with HTTPS traffic, but only TLSv1.1 or higher should be used unless there is a valid business justification to support the older, insecure SSLv3.
AWS Link http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html
Recommended Action Ensure that traffic sent between viewers and CloudFront is passed over HTTPS and uses TLSv1.1 or higher.

Detailed Remediation Steps

  1. Log in to the AWS Management Console.
  2. Select the "Services" option and search for CloudFront.
  3. Select the "CloudFront Distribution" that needs to be verified.
  4. Click the "Distribution ID" of the selected Distribution to get into the "CloudFront Distribution" configuration page.
  5. In the "General" tab of top menu, scroll to settings and click on the "Edit" button.
  6. On the Edit Settings page, scroll down and choose the "Security Policy" that you want CloudFront to use for HTTPS connections and must use TLSv1.2 "recommended" or higher SSL protocols.
  7. Scroll down and click on "Save Changes" to save the settings.
  8. Repeat the steps number 3 to 6 to verify whether any other "CloudFront Distribution" is not using an insecure SSL protocol for HTTPS traffic.