-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Identify source of TLS 1.0 or TLS 1.1 connections to oceansmap s3 bucket #8
Comments
I have followed the AWS step to check whether any client using s3 bucket connecting through TLSV1 or TLSv1.1
Next steps |
Thanks for looking into this @pavaniankam92 Great that we haven't picked up any TLSv1.0/1.1 calls, I wonder if the alert from AWS is just a false alarm. We do have lots of projects in the wild that are accessing the oceansmap s3 bucket. Instead of checking to see if any applications break, can I assume that rejected calls are logged so that we are able to track down problematic sites? |
@nguyandy Yes rejected calls should be logged as well. As we know that there are no calls being made on TLS 1.0/1.1 , can we go ahead and implement/enforce bucket policy with TLS 1.2? Please let me know and we would need to see if there can be a downtime to set this up and i will also come up with a roll back if there are any issues. |
Let's do it, preferably in the evening. |
Yes, alerts can be configured but I will need to explore the CloudTrail monitoring. |
Currently testing the cloudtrail logs monitoring through cloudwatch alarms, Used TLS v1.2 for testing alarms , if this works for TLS v1.2 then will put alarms for tLSv1.0 an d1.1 and through these alarms we will be notified through email for any TLS v1,0 and v1.1 calls. |
I have implemented the CloudWatch alarms for TLS v1.0 and TLS v1.1. |
Need to figure out where these TLS 1.0/1.1 requests are coming from so we can make updates where needed.
S3 bucket: https://s3.console.aws.amazon.com/s3/buckets/oceansmap
The text was updated successfully, but these errors were encountered: