Use Amazon CloudWatch to check S3 bucket access logs for TLS 1.0 and TLS 1.1

0

We recently received notification from Amazon regarding the identification of TLS 1.0 or TLS 1.1 connections to our S3 Bucket. Following the instructions provided in the links provided, we successfully enabled logging on our S3 Bucket and have saved a number of log files within the bucket. However, we encountered difficulties utilizing Amazon CloudWatch to effectively check and filter the log entries. Despite our efforts, we were unable to discern whether TLS 1.0 or TLS 1.1 connections are still active.

Also, we had a conversation with our website hosting provider, and they have confirmed that TLS 1.0 and TLS 1.1 are deprecated on their platform, with only TLS 1.2 and 1.3 currently in use.

Could you please provide us with detailed steps to verify if TLS 1.0 or TLS 1.1 connections are still active within our S3 Bucket?

已提问 2 个月前306 查看次数
1 回答
0

You need to use Athena and not cloudwatch to query the S3 access logs and identify the TLS Version. The instructions can be found here https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-s3-access-logs-to-identify-requests.html

You can search for all requests for "tlsversion" < '1.2' . You can review and then if needed, enforce TLS 1.2 or above using an S3 Bucket Policy

As Such

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "EnforceTLSv12orHigher",
      "Principal": {
        "AWS": "*"
      },
      "Action": [
        "s3:*"
      ],
      "Effect": "Deny",
      "Resource": [
        "arn:aws:s3:::DOC_EXAMPLE_BUCKET/*",
        "arn:aws:s3:::DOC_EXAMPLE_BUCKET"
      ],
      "Condition": {
        "NumericLessThan": {
          "s3:TlsVersion": 1.2
        }
      }
    }
  ]
}
profile picture
专家
已回答 2 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则