This rule specifies the use of SSL or HTTPS listeners for ELB application and network load balancers.
Rule | ELB application and network load balancers should only use SSL or HTTPS listeners |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description:
As per the NIST 800-53 Revision 5 guidelines, Elastic Load Balancers (ELB) application and network load balancers should only utilize SSL (Secure Sockets Layer) or HTTPS (Hypertext Transfer Protocol Secure) listeners. This rule ensures that data transmitted between the client and the load balancer is encrypted, providing an additional layer of security for sensitive information.
Remediation Steps:
To comply with the NIST 800-53 Revision 5 requirement and enforce SSL/HTTPS listeners on ELB application and network load balancers, the following steps can be followed:
Step 1: Identify ELB Load Balancers:
Identify the ELB application and network load balancers in your environment. Make a note of the load balancer names or ARNs (Amazon Resource Names) for reference in the following steps.
Step 2: Verify Listener Protocol:
Check the existing listener configurations for each load balancer to ensure they are set to use SSL or HTTPS protocols. If any listeners are configured to use HTTP, they need to be modified.
Step 3: Modify Listeners:
For each load balancer, modify the listener configurations to use either SSL or HTTPS protocols. Follow the instructions provided below based on the type of load balancer:
For Classic Load Balancer (v1):
For Application Load Balancer (v2) and Network Load Balancer:
Step 4: Verify Listener Updates:
After modifying the listener configurations, verify if the changes are successfully applied. Ensure that all the ELB application and network load balancers are using SSL or HTTPS protocols for their listeners.
Troubleshooting Steps (If listener updates fail):
In case you encounter any issues while modifying the listener configurations or if the changes do not take effect as expected, consider the following troubleshooting steps:
If the issue persists after following the troubleshooting steps, it is recommended to reach out to the AWS support team for further assistance.
Additional Notes: