π AWS CloudFront Web Distribution uses outdated SSL protocols with Custom Origins π’
- Contextual name: π Web Distribution uses outdated SSL protocols with Custom Origins π’
- ID:
/ce/ca/aws/cloudfront/distribution-uses-outdated-ssl-protocols
- Located in: π AWS CloudFront
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- AWS Security Hub
- [[CloudFront.10] CloudFront distributions should not use deprecated SSL protocols between edge locations and custom origins]([CloudFront.10] CloudFront distributions should not use deprecated SSL protocols between edge locations and custom origins (https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-10)]
- Internal
dec-x-4002ecfe
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-4002ecfe | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
This policy checks that AWS CloudFront Web Distributions are configured to use secure, upβtoβdate SSL/TLS protocols for client connections. It identifies distributions that allow outdated protocols such as
SSLv3
,TLS 1.0
, andTLS 1.1
, which are susceptible to known cryptographic weaknesses.Rationaleβ
Allowing outdated SSL/TLS protocols exposes traffic to a range of security risks, including eavesdropping and man-in-the-middle attacks. Modern protocols like
TLS 1.2
and newer offer stronger cipher suites and are required by many regulatory and compliance standards (e.g., PCI DSS).Auditβ
This policy flags an AWS CloudFront Web Distribution as
INCOMPLIANT
if at least one custom AWS CloudFront Origin associated with the distribution (excluding S3 static websites as origin) is configured withCustom Origin Config Origin SSL Protocol
to allow the following protocols: SSLv3, TLSv1, TLSv1.1.If a Web Distribution has no Origins in the CMDB, the Distribution is marked as
UNDETERMINED
.
Remediationβ
Remediationβ
From Command Lineβ
Retrieve the current distribution configuration and capture its
ETag
:aws cloudfront get-distribution-config \
--id {{distribution-id}} \
--query 'DistributionConfig' \
> {{distribution-config}}.json
ETAG=$(aws cloudfront get-distribution-config \
--id {{distribution-id}} \
--query 'ETag' \
--output text)In the downloaded
{{distribution-config}}.json
, modify the origins (items in theOrigins
array) and update theItems
list inOriginSslProtocols
to include onlyTLSv1.2
.Apply the updated configuration to your distribution using the saved ETag:
aws cloudfront update-distribution \
--id {{distribution-id}} \
--if-match $ETAG \
--distribution-config file://{{distribution-config}}.json