Ensure there is an encrypted connection between AWS CloudFront server and Origin server

HIGH

Description

Data loss can occur due to un-encrypted connection between AWS CloudFront and Origin server.

Remediation

In AWS Console -

  1. Sign in to the AWS Console and open the CloudFront Console.
  2. Under Distributions, select the distribution that requires a secure setting.
  3. Under Origins, select the specific Origin to update (Note: this will only work on non-S3 origins; S3 origins cannot use HTTPS).
  4. For Protocol, choose HTTPS Only with TLSv1.2 selected.
  5. Select Save changes.

In Terraform -

  1. In the aws_cloudfront_distribution, set the ordered_cache_behavior.viewer_protocol_policy to either https-only or redirect-to-https.

For more information, see the AWS or Terraform documentation.
References:
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https-cloudfront-to-custom-origin.html
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution

Policy Details

Rule Reference ID: AC_AWS_0547
CSP: AWS
Remediation Available: Yes
Resource Category: Virtual Network
Resource Type: CloudFront

Frameworks