Benchmark: ELB
Description
This section contains recommendations for configuring ELB resources.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select ELB.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.all_controls_elb
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.all_controls_elb --share
Controls
- Classic Load Balancers should have connection draining enabled
- ELB application and classic load balancer logging should be enabled
- ELB load balancers should prohibit public access
- ELB application, network, and gateway load balancers should span multiple availability zones
- ELB application load balancer deletion protection should be enabled
- ELB application load balancers should be configured with defensive or strictest desync mitigation mode
- ELB application load balancers should be drop HTTP headers
- ELB application load balancers secured listener certificate should not expire within next 30 days
- ELB application load balancers secured listener certificate should not expire within next 7 days
- ELB application load balancers should redirect HTTP requests to HTTPS
- ELB application load balancers should have Web Application Firewall (WAF) enabled
- ELB application load balancers should have at least one outbound rule
- ELB application and network load balancers should use listeners
- ELB application and network load balancers should only use SSL or HTTPS listeners
- ELB classic load balancers should have cross-zone load balancing enabled
- ELB classic load balancers should be configured with defensive or strictest desync mitigation mode
- ELB classic load balancers should span multiple availability zones
- ELB classic load balancers should have at least one registered instance
- ELB classic load balancers should use SSL certificates
- ELB classic load balancers should only use SSL or HTTPS listeners
- ELB classic load balancers should have at least one inbound rule
- ELB classic load balancers should have at least one outbound rule
- ELB listeners should use secure SSL cipher
- ELB network load balancers should have TLS listener security policy configured
- ELB listeners SSL/TLS protocol version should be checked