Skip to content

enforce-https

Default Severity: critical

Explanation

Plain HTTP is unencrypted and human-readable. This means that if a malicious actor was to eavesdrop on your connection, they would be able to see all of your data flowing back and forth.

You should use HTTPS, which is HTTP over an encrypted (TLS) connection, meaning eavesdroppers cannot read your traffic.

Possible Impact

CloudFront is available through an unencrypted connection

Suggested Resolution

Only allow HTTPS for CloudFront distribution communication

Insecure Example

The following example will fail the aws-cloudfront-enforce-https check.

 resource "aws_cloudfront_distribution" "bad_example" {
    default_cache_behavior {
        viewer_protocol_policy = "allow-all"
      }
 }

Secure Example

The following example will pass the aws-cloudfront-enforce-https check.

 resource "aws_cloudfront_distribution" "good_example" {
    default_cache_behavior {
        viewer_protocol_policy = "redirect-to-https"
      }
 }