AWS_ELB_65
Using insecure and deprecated ciphers for your ELB Predefined Security Policy or Custom Security Policy could make the SSL connection between the client and the load balancer vulnerable to exploits. If your ELB SSL negotiation configuration use outdated cipher suites, remove outdated ciphers for your ELB Predefined or Custom Security Policy, to reduce the risk of the SSL connection being exploited
Perform the following to remove weak ciphers from ELB
Select the latest predefined security policy from the list named “ELBSecurityPolicy-2016-08”
Uncheck any insecure / deprecated ciphers from the SSL Ciphers section: click Save.
Referrences:
“Want to Know More?
Learn how our partners are managing their cloud security and compliance with Cloudlytics.
I hereby accept the GDPR and Privacy Policy, by subscribing to the newsletters.