Skip to content

Latest commit

 

History

History
25 lines (21 loc) · 2.11 KB

insecure-cloudfront-protocols.md

File metadata and controls

25 lines (21 loc) · 2.11 KB

CloudSploit

AWS / CloudFront / Insecure CloudFront Protocols

Quick Info

Plugin Title Insecure CloudFront Protocols
Cloud AWS
Category CloudFront
Description Detects the use of insecure HTTPS SSL/TLS protocols for use with HTTPS traffic between viewers and CloudFront
More Info CloudFront supports SSLv3 and TLSv1 protocols for use with HTTPS traffic, but only TLSv1.1 or higher should be used unless there is a valid business justification to support the older, insecure SSLv3.
AWS Link http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html
Recommended Action Ensure that traffic sent between viewers and CloudFront is passed over HTTPS and uses TLSv1.1 or higher.

Detailed Remediation Steps

  1. Log into the AWS Management Console.
  2. Select the "Services" option and search for CloudFront.
  3. Select the "CloudFront Distribution" that needs to be verified.
  4. Click the "Distribution Settings" button from menu to get into the "CloudFront Distribution" configuration page.
  5. Click the "Edit" button from the General tab on the top menu.
  6. Scroll down and choose the "Security Policy" that you want CloudFront to use for HTTPS connections and must use TLSv1.1 or higher SSL protocols.
  7. Scroll down and click on "Yes,Edit" to save the changes.
  8. Repeat the steps number 5 and 6 to establish any other "CloudFront Distribution" is not using an insecure SSL protocol for HTTPS traffic.