Profile Applicability:
Level 1
Description:
AWS IAM allows users to store SSL/TLS certificates for use with AWS services such as Elastic Load Balancers (ELB) and CloudFront. Certificates must be regularly reviewed and expired certificates must be removed to avoid unintended usage.
Rationale:
Expired certificates may lead to application failures if deployed on AWS services such as ELB, CloudFront, or API Gateway.
Ensures compliance with security policies requiring the removal of outdated certificates.
Reduces risk of security incidents, such as man-in-the-middle (MITM) attacks due to outdated cryptographic material.
Impact:
Deleting expired certificates may affect applications if they are still in use by AWS services.
Before removal, verify that the expired certificate is not in use.
If a certificate is actively used, it should be replaced with a valid one before deletion.
Default Value:
By default:
IAM does not automatically delete expired SSL/TLS certificates.
Expired certificates remain stored in IAM indefinitely until manually removed.
Pre-Requisites:
IAM Administrator Access:
Required permissions:
iam:ListServerCertificates
iam:GetServerCertificate
iam:DeleteServerCertificate
AWS CLI Installed (optional for automation).
Access to AWS ACM (if migrating to managed certificates).
Remediation:
Test Plan:
Using CLI
List all IAM-stored certificates:
aws iam list-server-certificates --query "ServerCertificateMetadataList[*].[ServerCertificateName, Expiration]" --output table
Review the output:
-------------------------------------------------
| ListServerCertificates |
+------------------------+----------------------+
| MyExpiredCert | 2023-12-01T23:59:59Z |
| ActiveCert2024 | 2024-07-10T23:59:59Z |
+------------------------+----------------------+
- Check for expired certificates: If the expiration date is in the past, the certificate must be removed.
Implementation Steps:
Step 1: Verify Certificate Usage - Before deleting a certificate, check if it is actively used in:
Elastic Load Balancers (ELB)
CloudFront Distributions
API Gateway
- Check ELB for expired certificates - List all ELBs and their associated certificates:
aws elb describe-load-balancers --query "LoadBalancerDescriptions[*].{Name:LoadBalancerName,CertArn:ListenerDescriptions[*].Listener.SSLCertificateId}"
- If the expired certificate is attached, replace it with a valid one before deletion.
Step 2: Delete Expired Certificates- Delete an expired certificate:
aws iam delete-server-certificate --server-certificate-name <CERTIFICATE_NAME>
Example:
aws iam delete-server-certificate --server-certificate-name MyExpiredCert
- Verify deletion by running the audit command again:
aws iam list-server-certificates
Backout Plan:
If an expired certificate was mistakenly deleted: Re-upload the certificate to IAM:
aws iam upload-server-certificate --server-certificate-name <CERT_NAME> --certificate-body file://certificate.pem --private-key file://private-key.pem --certificate-chain file://ca-chain.pem --path /cloudfront/
Verify that the certificate is available again in IAM:
aws iam list-server-certificatesReferences:
Managing SSL/TLS Certificates in IAM: AWS Guide
AWS CLI Command for Certificate Deletion: AWS Documentation
AWS Certificate Manager (ACM) Best Practices: AWS ACM Guide