Skip to main content

๐Ÿ’ผ Elastic Load Balancing (ELB)

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-0bab0aa1

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ [ELB.1] Application Load Balancer should be configured to redirect all HTTP requests to HTTPS
๐Ÿ’ผ [ELB.2] Classic Load Balancers with SSL/HTTPS listeners should use a certificate provided by AWS Certificate Manager
๐Ÿ’ผ [ELB.3] Classic Load Balancer listeners should be configured with HTTPS or TLS termination
๐Ÿ’ผ [ELB.4] Application Load Balancer should be configured to drop invalid http headers
๐Ÿ’ผ [ELB.5] Application and Classic Load Balancers logging should be enabled
๐Ÿ’ผ [ELB.6] Application, Gateway, and Network Load Balancers should have deletion protection enabled
๐Ÿ’ผ [ELB.7] Classic Load Balancers should have connection draining enabled
๐Ÿ’ผ [ELB.8] Classic Load Balancers with SSL listeners should use a predefined security policy that has strong AWS Configuration
๐Ÿ’ผ [ELB.9] Classic Load Balancers should have cross-zone load balancing enabled
๐Ÿ’ผ [ELB.10] Classic Load Balancer should span multiple Availability Zones
๐Ÿ’ผ [ELB.12] Application Load Balancer should be configured with defensive or strictest desync mitigation mode
๐Ÿ’ผ [ELB.13] Application, Network and Gateway Load Balancers should span multiple Availability Zones
๐Ÿ’ผ [ELB.14] Classic Load Balancer should be configured with defensive or strictest desync mitigation mode
๐Ÿ’ผ [ELB.17] Application and Network Load Balancers with listeners should use recommended security policies