β Repository β π Compliance Engine β π CloudAware β π AWS β π CloudFront
π‘οΈ AWS CloudFront Web Distribution uses outdated SSL protocols with Custom Originsπ’
- Contextual name: π‘οΈ Web Distribution uses outdated SSL protocols with Custom Originsπ’
- ID:
/ce/ca/aws/cloudfront/distribution-uses-outdated-ssl-protocols
- Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY
- Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [CloudFront.10] CloudFront distributions should not use deprecated SSL protocols between edge locations and custom origins
- Internal:
dec-x-4002ecfe
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-4002ecfe | 1 |
Descriptionβ
Descriptionβ
This policy checks that AWS CloudFront Web Distributions are configured to use secure, upβtoβdate SSL/TLS protocols for client connections. It identifies distributions that allow outdated protocols such as
SSLv3
,TLS 1.0
, andTLS 1.1
, which are susceptible to known cryptographic weaknesses.Rationaleβ
Allowing outdated SSL/TLS protocols exposes traffic to a range of security risks, including eavesdropping and man-in-the-middle attacks. Modern protocols like
TLS 1.2
and newer offer stronger cipher suites and are required by many regulatory and compliance standards (e.g., PCI DSS).Auditβ
This policy flags an AWS CloudFront Web Distribution as
INCOMPLIANT
if at least one custom AWS CloudFront Origin associated with the distribution (excluding S3 static websites as origin) is configured withCustom Origin Config Origin SSL Protocol
to allow the following protocols: SSLv3, TLSv1, TLSv1.1.If a Web Distribution has no Origins in the CMDB, the Distribution is marked as
UNDETERMINED
.
Remediationβ
Remediationβ
From Command Lineβ
Retrieve the current distribution configuration and capture its
ETag
:aws cloudfront get-distribution-config \
--id {{distribution-id}} \
--query 'DistributionConfig' \
> {{distribution-config}}.json
ETAG=$(aws cloudfront get-distribution-config \
--id {{distribution-id}} \
--query 'ETag' \
--output text)In the downloaded
{{distribution-config}}.json
, modify the origins (items in theOrigins
array) and update theItems
list inOriginSslProtocols
to include onlyTLSv1.2
.Apply the updated configuration to your distribution using the saved ETag:
aws cloudfront update-distribution \
--id {{distribution-id}} \
--if-match $ETAG \
--distribution-config file://{{distribution-config}}.json