This rule focuses on ensuring that ELB application load balancers redirect HTTP requests to HTTPS for enhanced security measures.
Rule | ELB application load balancers should redirect HTTP requests to HTTPS |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ Medium |
Rule Description:
To comply with FedRAMP Moderate Revision 4 requirements, Elastic Load Balancers (ELBs) with an application load balancer type should enforce HTTP to HTTPS redirection. This means that any HTTP requests received by the load balancer should be automatically redirected to HTTPS.
Enforcing this rule ensures that all communication between clients and the load balancer is encrypted, providing a more secure environment for the application.
Troubleshooting Steps (if applicable):
If HTTP to HTTPS redirection is not configured correctly on the load balancer, follow these troubleshooting steps:
Verify the load balancer's listener configurations:
Confirm the configured redirection action:
Verify the target group settings:
Review the security group settings:
Check the SSL certificate:
If the issue persists after confirming these settings, consider checking the application's web server configurations and logs for any potential issues.
Necessary Codes (if applicable):
In most cases, configuring the load balancer using the AWS Management Console or AWS Command Line Interface (CLI) does not require writing any specific code. However, you may need to use the AWS CLI to modify the listener rules or check configurations.
Step-by-Step Guide for Remediation:
Follow these steps to enforce HTTP to HTTPS redirection on an ELB application load balancer:
Open the AWS Management Console and navigate to the Amazon Elastic Load Balancing service.
Select the appropriate load balancer from the list.
In the "Listeners" tab, ensure that an HTTPS listener is already configured with a valid SSL/TLS certificate. If not, follow the instructions to create a new HTTPS listener and associate a certificate.
Click on the "Rules" tab and review the existing rules.
If a rule redirecting HTTP requests to HTTPS does not exist, click on the "Create Rule" button.
Create a new rule with the following configuration:
Save the rule.
Verify the health of the instances in the target group to ensure they can handle HTTPS traffic successfully.
Check the security group attached to the instances and make sure it allows inbound traffic on the HTTPS port (443) from the load balancer.
Test the redirection by accessing the load balancer's DNS name via HTTP. It should automatically redirect to HTTPS.
By following these steps, you will enforce HTTP to HTTPS redirection on your ELB application load balancer, ensuring compliance with FedRAMP Moderate Revision 4 requirements.