π AWS CloudFront Web Distribution uses default SSL/TLS certificate π’
- Contextual name: π Web Distribution uses default SSL/TLS certificate π’
- ID:
/ce/ca/aws/cloudfront/distribution-uses-default-certificate
- Located in: π AWS CloudFront
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
RELIABILITY
Similar Policiesβ
- AWS Security Hub
- [[CloudFront.7] CloudFront distributions should use custom SSL/TLS certificates]([CloudFront.7] CloudFront distributions should use custom SSL/TLS certificates (https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-7)]
- Internal
dec-x-4efd073e
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-4efd073e | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
This policy checks that an AWS CloudFront Web Distribution is configured to use a custom SSL/TLS certificate.
A custom SSL/TLS certificate allows you to serve your content over HTTPS using your own domain name in the URL, rather than the default
*.cloudfront.net
domain name assigned to your distribution.Rationaleβ
Deploying a custom SSL/TLS certificate and alternate CNAME ensures that end users see your organizationβs domain in the browserβs address bar. This provides clear assurance that the connection to your application is encrypted and authenticated.
Impactβ
It may incur additional fees for certificate procurement and renewal if not using a free ACM certificate.
You must create the appropriate CNAME records in your DNS zone to map your custom domain to the CloudFront distributionβs domain. Misconfigured DNS entries can lead to service interruptions or SSL validation failures.
Auditβ
This policy flags an AWS CloudFront Web Distribution as
INCOMPLIANT
if theViewer Certificate CloudFront Default
checkbox is true.
Remediationβ
Remediationβ
From Consoleβ
Prerequisitesβ
Before updating your CloudFront distribution to include an alternate domain name, complete the following:
- Register the desired domain name with Amazon RouteΒ 53 or a thirdβparty registrar.
- Get a valid TLS certificate from an approved Certificate Authority (CA) that covers your domain. Add the certificate to your distribution to validate that you are authorized to use the domain.
Add an Alternate Domain Nameβ
- Select your domain in the AWS Console and click Add Domain on the General tab.
- Enter up to five alternate domain names (CNAMEs).
- Under TLS Certificate, choose an existing ACM certificate or automatically or manually create a new certificate in ACM.
- Validate certificate ownership:
- Update your DNS providerβs records with the CNAME entries displayed in the CloudFront console to demonstrate domain ownership.
- click Validate Certificate in the console.
- Upon successful validation, click Next, review your configuration, and then choose Add Domains.
... see more