More Info:

AWS Redshift non-default parameter groups require SSL to secure data in transit.

Risk Level

Medium

Address

Security

Compliance Standards

HIPAA, GDPR, NIST

Triage and Remediation

Remediation

To remediate the misconfiguration of the Redshift Parameter Group requiring SSL in AWS using the AWS Management Console, follow these steps:

  1. Login to AWS Console: Go to the AWS Management Console and login to your account.

  2. Navigate to Redshift Service: In the AWS Management Console, navigate to the Amazon Redshift service.

  3. Select Parameter Groups: In the left-hand navigation pane, select “Parameter Groups”.

  4. Identify the Parameter Group: Identify the parameter group that is associated with your Redshift cluster. This parameter group should be the one that needs to have SSL enabled.

  5. Modify the Parameter Group: Select the parameter group by checking the box next to it, and then click on the “Modify” button at the top.

  6. Update SSL Configuration: In the parameter group settings, locate the parameter require_ssl and set its value to true to enforce SSL connections.

  7. Save Changes: After updating the require_ssl parameter, scroll to the bottom of the page and click on the “Save Changes” button to apply the configuration.

  8. Apply Changes to Cluster: Once the changes are saved, you will need to apply the modified parameter group to your Redshift cluster. To do this, select your Redshift cluster, click on the “Cluster Actions” dropdown, and choose “Modify”.

  9. Associate Parameter Group: In the Modify Cluster settings, select the modified parameter group from the dropdown list under the “Cluster Parameter Group” section.

  10. Apply Changes: Review the other settings if needed and click on the “Modify Cluster” button to apply the changes.

By following these steps, you have successfully enforced SSL connections for your Amazon Redshift cluster by modifying the parameter group settings.

Additional Reading: