π‘οΈ AWS ELB Classic Load Balancer Connection Draining is disabledπ’
- Contextual name: π‘οΈ Classic Load Balancer Connection Draining is disabledπ’
- ID:
/ce/ca/aws/elb/load-balancer-connection-draining - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
RELIABILITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [ELB.7] Classic Load Balancers should have connection draining enabled
- Cloud Conformity: ELB Connection Draining Enabled
Descriptionβ
Descriptionβ
This policy identifies AWS Classic Load Balancers that have Connection Draining disabled. Connection Draining allows a load balancer to stop routing new requests to instances that are being deregistered or marked unhealthy, while allowing existing in-flight requests to complete within a configured timeout period.
Rationaleβ
Enabling Connection Draining is critical during instance termination events caused by scale-in activities, maintenance operations, or when the load balancer detects an unhealthy instance and reroutes traffic.
Without Connection Draining, active connections may be terminated abruptly, which can lead to 5xx errors and negatively impact the end-user experience.
Auditβ
This policy flags an AWS Classic Load Balancer as
INCOMPLIANTwhen theConnection Draining Enabledis set to false.Other Load Balancer types are marked as
INAPPLICABLE.
Remediationβ
Remediationβ
Enable Connection Drainingβ
Connection Draining ensures that in-flight requests are allowed to complete before instances are deregistered or terminated.
From Command Lineβ
Run the following AWS CLI command to enable Connection Draining and configure the timeout period (in seconds) for the selected Classic Load Balancer:
aws elb modify-load-balancer-attributes \
--load-balancer-name {{lb-name}} \
--load-balancer-attributes ConnectionDraining={Enabled=true,Timeout={{300}}}
policy.yamlβ
Linked Framework Sectionsβ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.7] Classic Load Balancers should have connection draining enabled | 1 | no data | |||
| πΌ Cloudaware Framework β πΌ System Configuration | 69 | no data | |||
| πΌ FedRAMP High Security Controls β πΌ CM-2 Baseline Configuration (L)(M)(H) | 3 | 1 | 47 | no data | |
| πΌ FedRAMP Low Security Controls β πΌ CM-2 Baseline Configuration (L)(M)(H) | 45 | no data | |||
| πΌ FedRAMP Moderate Security Controls β πΌ CM-2 Baseline Configuration (L)(M)(H) | 3 | 47 | no data | ||
| πΌ NIST SP 800-53 Revision 5 β πΌ CA-9(1) Internal System Connections _ Compliance Checks | 54 | no data | |||
| πΌ NIST SP 800-53 Revision 5 β πΌ CM-2 Baseline Configuration | 7 | 46 | no data |