Skip to content

Latest commit

 

History

History
25 lines (21 loc) · 1.92 KB

insecure-ciphers.md

File metadata and controls

25 lines (21 loc) · 1.92 KB

CloudSploit

AWS / ELB / Insecure Ciphers

Quick Info

Plugin Title Insecure Ciphers
Cloud AWS
Category ELB
Description Detect use of insecure ciphers on ELBs
More Info Various security vulnerabilities have rendered several ciphers insecure. Only the recommended ciphers should be used.
AWS Link http://docs.aws.amazon.com/ElasticLoadBalancing/latest/DeveloperGuide/elb-security-policy-options.html
Recommended Action Update your ELBs to use the recommended cipher suites

Detailed Remediation Steps

  1. Log in to the AWS Management Console.
  2. Select the "Services" option and search for EC2.
  3. In the "EC2 Dashboard" scroll down and look for "Load Balancing" and click on "Load Balancers" to get into "Load Balancers" dashboard.
  4. Select the "Load Balancer" which needs to be verified.
  5. Select the "Listeners" tab from the bottom panel and scroll down to the "Cipher" column of HTTPS Listener and click on "Change" option.
  6. If you are using a "Predefined Security Policy" select the latest from the dropdown.
  7. If you are using "Custom Security Policy" then ensure that only the recommended ciphers are used. Refer to the link for all secure ciphers. https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-ssl-security-policy.html#ssl-ciphers
  8. Scroll down and click on "Save" button to make the changes.