πΌ [Redshift.2] Connections to Amazon Redshift clusters should be encrypted in transit
-
Contextual name: πΌ [Redshift.2] Connections to Amazon Redshift clusters should be encrypted in transit
-
ID:
/frameworks/aws-fsbp-v1.0.0/redshift/02
-
Located in: πΌ Redshift
Descriptionβ
TLS can be used to help prevent potential attackers from using person-in-the-middle or similar attacks to eavesdrop on or manipulate network traffic. Only encrypted connections over TLS should be allowed. Encrypting data in transit can affect performance. You should test your application with this feature to understand the performance profile and the impact of TLS.
Similarβ
- AWS Security Hub
- Internal
- ID:
dec-c-38a63ea5
- ID:
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ NIST SP 800-53 Revision 5 β πΌ AC-4 Information Flow Enforcement | 32 | 59 | 72 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(4) Boundary Protection _ External Telecommunications Services | 17 | |||
πΌ NIST SP 800-53 Revision 5 β πΌ SC-8 Transmission Confidentiality and Integrity | 5 | 8 | 10 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-8(1) Transmission Confidentiality and Integrity _ Cryptographic Protection | 8 | 10 | ||
πΌ NIST SP 800-53 Revision 5 β πΌ SC-8(2) Transmission Confidentiality and Integrity _ Pre- and Post-transmission Handling | 2 | |||
πΌ NIST SP 800-53 Revision 5 β πΌ SC-13 Cryptographic Protection | 4 | 6 | ||
πΌ NIST SP 800-53 Revision 5 β πΌ SC-23 Session Authenticity | 5 | 2 | ||
πΌ NIST SP 800-53 Revision 5 β πΌ SC-23(3) Session Authenticity _ Unique System-generated Session Identifiers | 2 | |||
πΌ PCI DSS v4.0.1 β πΌ 4.2.1 Strong cryptography and security protocols are implemented to safeguard PAN during transmission over open, public networks. | 2 | 9 |
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|