π‘οΈ AWS CloudFront Web Distribution uses legacy Security Policyπ’
- Contextual name: π‘οΈ Web Distribution uses legacy Security Policyπ’
- ID:
/ce/ca/aws/cloudfront/distribution-security-policy - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [CloudFront.15] CloudFront distributions should use the recommended TLS security policy
Descriptionβ
Descriptionβ
This policy identifies AWS CloudFront distributions that are not configured with a security policy enforcing a minimum TLS version of
TLSv1.2_2021and appropriate cipher suites for HTTPS viewer connections. An AWS CloudFront security policy defines two key parameters: the SSL/TLS protocol version CloudFront uses to communicate with viewers and the cipher suites used to encrypt content delivered to users.It is recommended to configure CloudFront distributions to use TLS 1.2 (preferably TLS 1.3) as the minimum supported protocol version, unless compatibility requirements mandate support for legacy browsers or devices that do not support TLS 1.2 or later.
Rationaleβ
Using a predefined security policy that enforces TLS 1.2 or TLS 1.3 as the minimum protocol version enhances the security posture of websites and web applications delivered through CloudFront by reducing exposure to known cryptographic vulnerabilities.
Auditβ
This policy flags an AWS CloudFront Distribution as
INCOMPLIANTifViewer Certificate Min Protocol Versionis:... see more
Remediationβ
Remediationβ
Update the Security Policyβ
From Consoleβ
- Log in to the AWS Management Console.
- Navigate to the Amazon CloudFront console.
- In the left navigation pane, choose Distributions.
- Select the CloudFront distribution to reconfigure.
- Open the General tab and choose Edit.
- Under Security policy, select TLSv1.2_2025 (recommended).
- Choose Save changes.
- Repeat these steps for each CloudFront distribution, if applicable.
From Command Lineβ
Retrieve the current distribution configuration
aws cloudfront get-distribution-config \
--id {{distribution-id}} \
--query 'DistributionConfig'Identify the non-compliant setting
In the output, locate the
ViewerCertificate.MinimumProtocolVersionfield. For example:{
"ViewerCertificate": {
"SSLSupportMethod": "sni-only",
"MinimumProtocolVersion": "TLSv1",
"CertificateSource": "acm"
}
}Retrieve the configuration ETag
... see more
policy.yamlβ
Linked Framework Sectionsβ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [CloudFront.15] CloudFront distributions should use the recommended TLS security policy | 1 | no data | |||
| πΌ AWS Well-Architected β πΌ SEC09-BP01 Implement secure key and certificate management | 5 | no data | |||
| πΌ Cloudaware Framework β πΌ Data Encryption | 66 | no data |