More Info:

Ensure that the AWS Elastic Beanstalk CNAME records are not vulnerable.

Risk Level

Medium

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the vulnerability of AWS Elastic Beanstalk CNAME Records in AWS Route53 using the AWS console, follow these steps:

  1. Sign in to the AWS Management Console.
  2. Go to the Route53 service.
  3. In the Route53 dashboard, select the hosted zone where the Elastic Beanstalk CNAME record is present.
  4. Locate the CNAME record associated with your Elastic Beanstalk environment.
  5. Click on the CNAME record to select it.
  6. Choose the “Actions” dropdown menu and click on “Delete record set” to remove the vulnerable CNAME record.
  7. Confirm the deletion by clicking on “Yes, Delete”.
  8. Once the CNAME record is deleted, you need to create an Alias record to point to the Elastic Beanstalk environment.
  9. Click on the “Create record set” button.
  10. In the “Name” field, enter the subdomain or hostname you want to associate with the Elastic Beanstalk environment.
  11. Set the “Type” field to “A - IPv4 address”.
  12. Check the “Alias” checkbox.
  13. In the “Alias target” field, select your Elastic Beanstalk environment from the dropdown list.
  14. Click on the “Create” button to create the Alias record.
  15. Verify that the new Alias record is created and points to the correct Elastic Beanstalk environment.

By following these steps, you have successfully remediated the vulnerability of AWS Elastic Beanstalk CNAME Records in AWS Route53 using the AWS console.