Redshift does not use SSL
Description
This policy identifies Redshift databases in which data connection to and from is occurring on an insecure channel. SSL connections ensures the security of the data in transit.
Fix - Runtime
AWS Console
- Login to the AWS and navigate to the
Amazon Redshiftservice. - Expand the identified
Redshiftcluster and make a note of theCluster Parameter Group - In the navigation panel, click on the
Parameter group. - Select the identified
Parameter Groupand click onEdit Parameters. - Review the require_ssl flag. Update the parameter
require_sslto true and save it.
Note: If the current parameter group is a Default parameter group, it cannot be edited. You will need to create a new parameter group and point it to an affected cluster.
Fix - Buildtime
Terraform
- Resource: aws_redshift_parameter_group
- Argument: parameter.require_ssl
` ` `go aws_s3_bucket.test.tf resource “aws_redshift_parameter_group” “pass” { … parameter { name = “require_ssl” value = “true” } }
## CloudFormation
– **Resource**: AWS::Redshift::ClusterParameterGroup
– **Argument**: Properties.Parameters
` ` `yaml
Type: AWS::Redshift::ClusterParameterGroup
Properties:
…
Parameters:
+ – ParameterName: “require_ssl”
+ ParameterValue: “true”
