Benchmark: CloudFront
Description
This section contains recommendations for configuring CloudFront resources.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select CloudFront.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.all_controls_cloudfront
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.all_controls_cloudfront --share
Controls
- CloudFront distributions should have origin failover configured
- CloudFront distributions should encrypt traffic to custom origins
- CloudFront distributions should have a default root object configured
- CloudFront distributions should require encryption in transit
- CloudFront distributions should have field level encryption enabled
- CloudFront distributions should have geo restriction enabled
- CloudFront distributions should have latest TLS version
- CloudFront distributions access logs should be enabled
- CloudFront distributions should not use deprecated SSL protocols between edge locations and custom origins
- CloudFront distributions should not point to non-existent S3 origins
- CloudFront distributions should encrypt traffic to non S3 origins
- CloudFront distributions should have origin access identity enabled
- CloudFront distributions should use SNI to serve HTTPS requests
- CloudFront distributions should use custom SSL/TLS certificates
- CloudFront distributions should use secure SSL cipher
- CloudFront distributions should have AWS WAF enabled