You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In addition to encryption of data at rest, AWS recommends to enforce encryption of data in transit for services like Amazon Amazon S3, Amazon SQS and Amazon SNS. Enhance the following patterns to apply this best practice of enforce encryption of data in transit:
aws-apigateway-sqs
aws-cloudfront-s3
aws-iot-kinesisfirehose-s3
aws-kinesisfirehose-s3
aws-kinesisfirehose-s3-and-kinesisanalytics
aws-lambda-s3
aws-lambda-sns
aws-lambda-sqs
aws-lambda-sqs-lambda
aws-s3-lambda
aws-s3-step-function
aws-sns-lambda
aws-sqs-lambda
Solution:
Apply the resource policy for S3 Bucket, SNS Topic or SQS Queue created by the constructs to allow only encrypted connections over HTTPS (TLS) using the aws:SecureTransport condition in the resource policy.
Issue:
In addition to encryption of data at rest, AWS recommends to enforce encryption of data in transit for services like Amazon Amazon S3, Amazon SQS and Amazon SNS. Enhance the following patterns to apply this best practice of enforce encryption of data in transit:
Solution:
Apply the resource policy for S3 Bucket, SNS Topic or SQS Queue created by the constructs to allow only encrypted connections over HTTPS (TLS) using the
aws:SecureTransport
condition in the resource policy.Best practices documentation:
Amazon S3: https://docs.aws.amazon.com/AmazonS3/latest/dev/security-best-practices.html
Amazon SNS: https://docs.aws.amazon.com/sns/latest/dg/sns-security-best-practices.html#enforce-encryption-data-in-transit
Amazon SQS: https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-security-best-practices.html#ensure-queues-not-publicly-accessible
The text was updated successfully, but these errors were encountered: