This rule states that ELB application and network load balancers should only use SSL or HTTPS listeners.
Rule | ELB application and network load balancers should only use SSL or HTTPS listeners |
Framework | GxP 21 CFR Part 11 |
Severity | ✔ High |
Title: Rule Description and Remediation for GxP 21 CFR Part 11 Compliance with SSL/HTTPS Listeners for ELB Application and Network Load Balancers
Description: To ensure compliance with the GxP 21 CFR Part 11 regulations regarding the security of electronic records and digital signatures, it is required that Elastic Load Balancers (ELB) - both application and network load balancers - only use SSL or HTTPS listeners. This rule aims to protect sensitive information by encrypting communication between clients and the load balancers, thus preventing unauthorized access.
Troubleshooting Steps (if applicable): If non-HTTPS listeners are found on ELB application or network load balancers, follow the remediation steps outlined below to address the compliance violation.
Remediation Steps:
Identify the load balancers:
Audit the listeners:
Modify or delete non-compliant listeners:
Create a new HTTPS listener (if necessary):
For application load balancer:
For network load balancer:
Validate the configuration:
Note: Remember to retain appropriate documentation of SSL certificates, configurations, and any changes made to demonstrate compliance with GxP 21 CFR Part 11 regulations.
Code (if applicable): No specific code is required for this rule. The modifications and creation of HTTPS listeners are performed using the AWS Management Console or the AWS CLI with appropriate commands related to load balancers (e.g. "aws elbv2 create-listener").
Conclusion: By adhering to this rule that mandates the usage of SSL or HTTPS listeners for ELB application and network load balancers, you ensure compliance with GxP 21 CFR Part 11 regulations. This not only protects sensitive data but also reinforces the security of electronic records and digital signatures.