Skip to main content

Repository → 💼 CIS AWS v6.0.0 → 💼 2 Identity and Access Management

💼 2.18 Ensure that all expired SSL/TLS certificates stored in AWS IAM are removed (Automated)

  • ID: /frameworks/cis-aws-v6.0.0/02/18

Description

To enable HTTPS connections to your website or application in AWS, you need an SSL/TLS server certificate. You can use AWS Certificate Manager (ACM) or IAM to store and deploy server certificates. Use IAM as a certificate manager only when you must support HTTPS connections in a region that is not supported by ACM. IAM securely encrypts your private keys and stores the encrypted version in IAM SSL certificate storage. IAM supports deploying server certificates in all regions, but you must obtain your certificate from an external provider for use with AWS. You cannot upload an ACM certificate to IAM. Additionally, you cannot manage your certificates from the IAM Console.

Similar

  • Sections
    • /frameworks/cis-aws-v5.0.0/01/18

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v5.0.0 → 💼 1.18 Ensure that all expired SSL/TLS certificates stored in AWS IAM are removed (Automated)1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v5.0.0 → 💼 1.18 Ensure that all expired SSL/TLS certificates stored in AWS IAM are removed (Automated)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS IAM Server Certificate is expired🟢1🟢 x6no data