CloudFront distributions should encrypt traffic to custom origins

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Description

This check verifies if Amazon CloudFront distributions are securing traffic to custom origins. Failure for this control occurs when a CloudFront distribution permits the ‘http-only’ origin protocol policy. Additionally, failure is also flagged if the distribution’s origin protocol policy is ‘match-viewer’ while the viewer protocol policy is set to ‘allow-all’.

Using HTTPS (TLS) can enhance security by safeguarding against eavesdropping or manipulation of network traffic. It is advisable to only allow encrypted connections through HTTPS (TLS).

Remediation

For instructions on how to mandate encryption for communication between CloudFront and your custom origin by updating the Origin Protocol Policy, refer to Requiring HTTPS for communication between CloudFront and your custom origin in the Amazon CloudFront Developer Guide.

PREVIEWING: brett.blue/embedded-collector-release