πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [APIGateway.2] API Gateway REST API stages should be configured to use SSL certificates for backend authentication" | | 1 | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [CloudFront.3] CloudFront distributions should require encryption in transit | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [CloudFront.7] CloudFront distributions should use custom SSL/TLS certificates | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [CloudFront.8] CloudFront distributions should use SNI to serve HTTPS requests | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [CloudFront.10] CloudFront distributions should not use deprecated SSL protocols between edge locations and custom origins | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [DMS.9] DMS endpoints should use SSL | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [DMS.12] DMS endpoints for Redis OSS should have TLS enabled | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [DynamoDB.7] DynamoDB Accelerator clusters should be encrypted in transit | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EKS.3] EKS clusters should use encrypted Kubernetes secrets | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ElastiCache.5] ElastiCache replication groups should be encrypted in transit | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.1] Application Load Balancer should be configured to redirect all HTTP requests to HTTPS | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.2] Classic Load Balancers with SSL/HTTPS listeners should use a certificate provided by AWS Certificate Manager | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.3] Classic Load Balancer listeners should be configured with HTTPS or TLS termination | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.8] Classic Load Balancers with SSL listeners should use a predefined security policy that has strong AWS Configuration | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ELB.17] Application and Network Load Balancers with listeners should use recommended security policies | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EMR.4] Amazon EMR security configurations should be encrypted in transit | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ES.3] Elasticsearch domains should encrypt data sent between nodes | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [ES.8] Connections to Elasticsearch domains should be encrypted using the latest TLS security policy | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [MSK.1] MSK clusters should be encrypted in transit among broker nodes | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Opensearch.3] OpenSearch domains should encrypt data sent between nodes | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Opensearch.8] Connections to OpenSearch domains should be encrypted using the latest TLS security policy | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Redshift.2] Connections to Amazon Redshift clusters should be encrypted in transit | | | | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [S3.5] S3 general purpose buckets should require requests to use SSL | | 1 | 1 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Transfer.2] Transfer Family servers should not use FTP protocol for endpoint connection | | | | |