Skip to main content

πŸ›‘οΈ AWS Lambda Function Runtime is deprecated🟒

Logic​

Similar Policies​

Description​

Open File

Description​

This policy identifies AWS Lambda Functions that are using runtimes which AWS has designated as deprecated.

AWS Lambda supports multiple runtimes for various programming languages. Each runtime is tied to a specific version of the programming language and underlying operating system. When a language or operating system reaches its end of life (EOL), AWS deprecates the associated Lambda runtime.

Rationale​

Using deprecated runtimes introduces significant security and operational risks. Deprecated runtimes no longer receive security patches for the programming language or the underlying operating system. In addition, AWS may restrict the creation of new functions or updates to existing functions that rely on deprecated runtimes. New Lambda features, SDK updates, and AWS service integrations may also be incompatible with older runtimes.

Maintaining supported, up-to-date runtimes helps ensure that serverless applications remain secure, reliable, and fully supported by AWS.

Impact​

Known vulnerabilities in outdated language versions or operating system libraries will remain unpatched, increasing the risk of exploitation by malicious actors.

... see more

Remediation​

Open File

Remediation​

Migrate the Lambda Function to a Supported Runtime​

When an AWS Lambda runtime is deprecated, AWS blocks the creation of new functions and the updating of existing functions that use the deprecated runtime shortly after deprecation. As a result, remediation typically requires creating a new Lambda function using a supported runtime.

From Command Line​
  1. Review the list of supported AWS Lambda runtimes and select the appropriate target runtime version: https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtimes.html#runtimes-supported

  2. Update the function code to be compatible with the selected runtime. This may include modifying language syntax, replacing deprecated APIs, and updating third-party dependencies or Lambda layers.

  3. Create a new Lambda function using the updated code and a supported runtime:

    aws lambda create-function \
    --function-name {{new-function-name}} \
    --runtime {{latest-runtime-version}} \

... see more

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Lambda.2] Lambda functions should use supported runtimes1no data
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό Infrastructure Modernization21no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CM-2 Baseline Configuration (L)(M)(H)3147no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-2 Flaw Remediation (L)(M)(H)2723no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-2(2) Automated Flaw Remediation Status (M)(H)8no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό CM-2 Baseline Configuration (L)(M)(H)45no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό SI-2 Flaw Remediation (L)(M)(H)23no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό CM-2 Baseline Configuration (L)(M)(H)347no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SI-2 Flaw Remediation (L)(M)(H)223no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SI-2(2) Automated Flaw Remediation Status (M)(H)8no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-01: Improvements are identified from evaluations45no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties59no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities60no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CA-9(1) Internal System Connections _ Compliance Checks54no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CM-2 Baseline Configuration746no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-2 Flaw Remediation6620no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-2(2) Flaw Remediation _ Automated Flaw Remediation Status18no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-2(4) Flaw Remediation _ Automated Patch Management Tools8no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-2(5) Flaw Remediation _ Automatic Software and Firmware Updates28no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 12.3.4 Hardware and software technologies in use are reviewed at least once every 12 months.1no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 12.3.4 Hardware and software technologies in use are reviewed at least once every 12 months.1no data