Plugin Title | Insecure CloudFront Protocols |
Cloud | AWS |
Category | CloudFront |
Description | Detects the use of insecure HTTPS SSL/TLS protocols for use with HTTPS traffic between viewers and CloudFront |
More Info | CloudFront supports SSLv3 and TLSv1 protocols for use with HTTPS traffic, but only TLSv1.1 or higher should be used unless there is a valid business justification to support the older, insecure SSLv3. |
AWS Link | http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html |
Recommended Action | Ensure that traffic sent between viewers and CloudFront is passed over HTTPS and uses TLSv1.1 or higher. |
- Log in to the AWS Management Console.
- Select the "Services" option and search for CloudFront.
- Select the "CloudFront Distribution" that needs to be verified.
- Click the "Distribution ID" of the selected Distribution to get into the "CloudFront Distribution" configuration page.
- In the "General" tab of top menu, scroll to settings and click on the "Edit" button.
- On the Edit Settings page, scroll down and choose the "Security Policy" that you want CloudFront to use for HTTPS connections and must use TLSv1.2 "recommended" or higher SSL protocols.
- Scroll down and click on "Save Changes" to save the settings.
- Repeat the steps number 3 to 6 to verify whether any other "CloudFront Distribution" is not using an insecure SSL protocol for HTTPS traffic.