Ensure that all the internet-facing Classic Load Balancers (CLBs) available within your AWS account are regularly reviewed for security purposes. An internet-facing ELB load balancer has a publicly resolvable DNS name (identified by an A record), required to route requests from clients over the Internet to the EC2 instances registered with the load balancer. In opposition, an internal ELB load balancer is commonly used within a multi-tier architecture, where you have front-end web servers that perform requests to an internal load balancer, using private IP addresses that are resolved from the internal load balancer's DNS name. Trend Cloud One™ – Conformity strongly recommends reviewing your Classic Load Balancers on a regular basis to ensure that the scheme used by each ELB resource fits the necessary requirements from the security standpoint.
This rule can help you with the following compliance standards:
- PCI
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
Using the right scheme (internal or internet-facing) for your Classic Load Balancers (CLBs) is vital for maintaining the security of your load balancing cloud architecture.
Audit
To identify the scheme used by the Classic Load Balancers deployed within your AWS account, perform the following actions:
Remediation/Resolution:
Review your internet-facing ELB load balancers and change the scheme configuration for the load balancers that are not following the regulatory security requirements. To change the scheme for your Classic Load Balancers you need to re-create them with the internal scheme configuration. To create internal ELB load balancers, perform the following actions:
References
- AWS Documentation
- How Elastic Load Balancing works
- Internet-facing Classic Load Balancers
- Create an internal Classic Load Balancer
- AWS Command Line Interface (CLI) Documentation
- describe-load-balancers
- create-load-balancer
- register-instances-with-load-balancer
- create-security-group
- authorize-security-group-ingress
- authorize-security-group-egress