This rule ensures that ELB application load balancers drop HTTP headers for security compliance.
Rule | ELB application load balancers should be drop HTTP headers |
Framework | NIST 800-53 Revision 4 |
Severity | ✔ High |
Rule Description
According to the NIST 800-53 Revision 4 compliance standard, ELB (Elastic Load Balancer) application load balancers should drop specific HTTP headers to ensure information security and prevent potential vulnerabilities.
Troubleshooting Steps
Necessary Codes
The following AWS CLI command can be used to drop specific headers from the ELB application load balancer:
aws elbv2 modify-load-balancer-attributes --load-balancer-arn <load_balancer_arn> --attributes Key=deletion-protections.enabled,Value=false
Step-by-Step Guide for Remediation
Please follow the steps below to remediate the ELB application load balancer according to the NIST 800-53 Revision 4 compliance requirements:
aws elbv2 modify-load-balancer-attributes --load-balancer-arn <load_balancer_arn> --attributes Key=deletion-protections.enabled,Value=false
Replace
<load_balancer_arn>
with the actual Load Balancer ARN obtained in step 6.Note: It is advisable to test the changes in a staging or testing environment before implementing them in a production environment.
By following the above steps, you will be able to drop specific HTTP headers for your ELB application load balancer, ensuring compliance with the NIST 800-53 Revision 4 standard.