Ensure IAM server certificate was not uploaded before the Heartbleed security bug fix
Ensure that SSL/TLS server certificates stored in AWS IAM are not exposed to the Heartbleed security bug (Uploaded before April 8, 2014).
Risk Level: Critical
Cloud Entity: IAM Server Certificate
CloudGuard Rule ID: D9.AWS.CRY.58
Covered by Spectral: No
Category: Security, Identity, & Compliance
GSL LOGIC
IamServerCertificate should not have uploadDate < 1396915200
REMEDIATION
From Command Line
To list all IAM server certificates, run:
aws iam list-server-certificates
*Ensure no IAM server certificate was uploaded before 'April 8, 2014' (Unix timestamp: 1396915200).
To delete an IAM server certificate, run:
aws iam delete-server-certificate --server-certificate-name CERTIFICATE-NAME
References
- https://heartbleed.com/
- https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/iam/list-server-certificates.html
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/iam/delete-server-certificate.html
IAM Server Certificate
To enable HTTPS connections to your website or application in AWS, you need an SSL/TLS server certificate. You can use a server certificate provided by AWS Certificate Manager (ACM) or one that you obtained from an external provider. You can use ACM or IAM to store and deploy server certificates.
Compliance Frameworks
- AWS CloudGuard Best Practices
- AWS CloudGuard SOC2 based on AICPA TSC 2017
- AWS HITRUST v11.0.0
- AWS MITRE ATT&CK Framework v11.3
- AWS NIST 800-53 Rev 5
- AWS PCI-DSS 4.0
- CloudGuard AWS All Rules Ruleset
- CloudGuard AWS Default Ruleset
Updated about 1 year ago