Ensures that connections to Amazon Redshift clusters are encrypted in transit, protecting data from interception.
Rule | Connections to Amazon Redshift clusters should be encrypted in transit |
Framework | AWS Foundational Security Best Practices |
Severity | ✔ Medium |
Description:
All connections to Amazon Redshift clusters should be encrypted in transit to ensure the security and confidentiality of data being transmitted to and from the clusters. Encryption in transit helps protect against unauthorized access and interception of data.
Troubleshooting Steps:
If you encounter issues with encrypting connections to Amazon Redshift clusters, follow these troubleshooting steps:
Code:
To enforce SSL encryption for connections to your Amazon Redshift cluster, you can use the following Amazon Redshift parameter group setting:
require_ssl = true
Remediation:
Follow these steps to ensure connections to your Amazon Redshift clusters are encrypted in transit:
require_ssl
parameter to true
.By following these steps, you can ensure that all connections to your Amazon Redshift clusters are encrypted in transit, in compliance with AWS Foundational Security Best Practices.