Profile Applicability:
Level 2
Description
Amazon CloudFront is a web service that speeds up the distribution of your static and dynamic web content. Using insecure and deprecated SSL protocols could leave your site and origin server vulnerable to exploits. Ensuring that CloudFront distributions use up-to-date SSL protocols is crucial for maintaining the security and integrity of your web applications.
Rationale
Enhanced Security: Prevents vulnerabilities and exploits associated with deprecated SSL protocols.
Compliance: Ensures adherence to security best practices and regulatory requirements.
Improved Performance: Modern SSL protocols offer better performance and security features.
Impact
Pros:
Enhances security by using up-to-date SSL protocols.
Reduces the risk of exploits and vulnerabilities.
Ensures compliance with security standards.
Cons:
May require updating configurations and testing compatibility.
Potential temporary disruption during the update process.
Default Value
By default, SSL protocol is not selected for the HTTPS protocol. It must be explicitly configured to use modern SSL protocols.
Pre-Requisite
IAM Permissions:
cloudfront:GetDistribution
cloudfront:UpdateDistribution
AWS CLI installed and configured.
Remediation
Test Plan:
Using AWS Console:
Sign in to the AWS Management Console.
Navigate to the CloudFront Dashboard.
Click on the Distributions tab in the top left navigation menu.
Select the Distributions you want to audit.
Click on the Origins tab in the top menu.
Select the Origin to examine.
Click on the Edit tab from the top right.
Identify if there is an SSL origin protocol for the HTTPS-only protocol.
Verify that the selected distribution origin is not using an insecure SSL protocol.
Using AWS CLI:
Check SSL Protocol Status:
aws cloudfront get-distribution --id <id-value> --query 'Distribution.DistributionConfig.Origins.Items[*].CustomOriginConfig'
Implementation Steps:
Using AWS Console:
Sign in to the AWS Management Console.
Navigate to the CloudFront Dashboard.
Click on the Distributions tab in the top left navigation menu.
Select the Distributions you want to change.
Click on the Origins tab in the top menu.
Select the origin you want to change and click edit.
From the Protocol section and HTTPS-only section, choose the TLSv1 minimum origin SSL protocol.
Click on Save changes to save the changes.
Using AWS CLI:
Save the JSON file document named distconfig-secure-origin.json.
Update the distribution:
aws cloudfront update-distribution --id <id-value> --default-root-object index.html
Backout Plan
If updating SSL protocols causes issues: Using AWS Console:
Navigate to the CloudFront Dashboard.
Select the Distribution.
Click Edit Attributes.
From the Protocol section and HTTPS-only section, choose the SSLv3 minimum origin SSL protocol.
Click Save changes to save the changes.
Using AWS CLI:
aws cloudfront update-distribution --id <id-value> --default-root-object index.html
References
CloudFront No Deprecated SSL Protocols
Ensure CloudFront Distributions Are Not Using Deprecated SSL Protocols