Protecting Data in Transit to Amazon EMR

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Amazon EMR includes a number of application communication paths, each of which requires separate protection mechanisms for data in transit.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Where available, implement SSL/TLS or SSH between Haddop cluster and endpoints. In many cases HTTPS is used by default to secure connections, but for user/application and administrative access SSL/TLS or SSH should be implemented as available.

See Also

https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

Item Details

Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION, PHYSICAL AND ENVIRONMENTAL PROTECTION, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-2, 800-53|AC-3, 800-53|AC-4, 800-53|AC-6, 800-53|AC-11, 800-53|AC-18, 800-53|AU-13, 800-53|IA-3, 800-53|IA-7, 800-53|PE-19, 800-53|SA-8, 800-53|SC-7, 800-53|SC-8, 800-53|SC-9, 800-53|SC-13, 800-53|SC-16, 800-53|SC-23, 800-53|SC-28, 800-53|SI-7, 800-53|SI-8

Plugin: amazon_aws

Control ID: 14038e66ff0ff30a824f6d628dac9254cadf97f0e95d8ece191dae062db53383