Ensure that your Amazon Network Load Balancers (NLBs) are using the latest recommended predefined security policy for TLS negotiation configuration in order to protect their front-end connections against TLS vulnerabilities and meet regulatory requirements.
The latest ELB security policies are:
- ELBSecurityPolicy-TLS13-1-2-2021-06
- ELBSecurityPolicy-TLS13-1-3-2021-06
- ELBSecurityPolicy-TLS13-1-2-Res-2021-06
This rule can help you with the following compliance standards:
- PCI
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
Using a deprecated security policy for the TLS negotiation configuration set for your Network Load Balancer (NLB) will expose the connection between the client and the load balancer to various vulnerabilities. To maintain your NLB TLS configuration secure, Trend Cloud One™ – Conformity recommends using the latest predefined security policy released by Amazon Web Services (AWS), i.e. ELBSecurityPolicy-TLS13-1-2-2021-06. This security policy includes TLS 1.3, which is optimized for security and performance, and is backward compatible with TLS 1.2.
Note: Amazon Network Load Balancers do not support custom security policies.
Audit
To determine if your Network Load Balancers (NLBs) are using deprecated security policies, perform the following operations:
Remediation / Resolution
To update the listener configuration of your Amazon Network Load Balancers (NLBs) in order to use the latest predefined security policy, perform the following operations:
References
- AWS Documentation
- Elastic Load Balancing FAQs
- Listeners for your Network Load Balancers
- TLS listeners for your Network Load Balancer
- AWS Command Line Interface (CLI) Documentation
- elbv2
- describe-load-balancers
- describe-listeners
- modify-listener
- CloudFormation Documentation
- Elastic Load Balancing V2 resource type reference
- Terraform Documentation
- AWS Provider