Protecting Data in Transit to Amazon S3

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Like AWS service management traffic, Amazon S3 is accessed using SOAP over HTTPS. This includes all Amazon S3 service management requests as well as user payload, such as the contents of objects being stored/retrieved from Amazon S3, and associated metadata.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

When the AWS service console is used to manage Amazon S3, an SSL/TLS secure connection is established between the client browser and the service console endpoint. All subsequent traffic is protected within this connection. When Amazon S3 APIs are used directly or indirectly, an SSL/TLS connection is established between the client and the Amazon S3 endpoint, and then all subsequent HTTP, SOAP, and user payload traffic is encapsulated within the protected session.

See Also

https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

Item Details

Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION, PHYSICAL AND ENVIRONMENTAL PROTECTION, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-2, 800-53|AC-3, 800-53|AC-4, 800-53|AC-6, 800-53|AC-11, 800-53|AC-18, 800-53|AU-13, 800-53|IA-3, 800-53|IA-7, 800-53|PE-19, 800-53|SA-8, 800-53|SC-7, 800-53|SC-8, 800-53|SC-9, 800-53|SC-13, 800-53|SC-16, 800-53|SC-23, 800-53|SC-28, 800-53|SI-7, 800-53|SI-8

Plugin: amazon_aws

Control ID: abdf9b13ef8c0179522b4fe7ce73f44e98b96a7c4e6ead5d2cecca7119eaf38a