CloudFront Checklist
CloudFront Checklist
CloudFront
Security Checklist
Use HTTPS Enforce HTTPS for connections between
clients and CloudFront, as well as between
CloudFront and your origin servers to protect
data in transit.
Enable Field-Level Encryption Use field-level encryption to protect sensitive
data within HTTP(S) POST requests by
encrypting specific form fields at the edge.
Use Origin Access Identity (OAI) Restrict access to your S3 origin by creating
an Origin Access Identity (OAI) and using it in
your CloudFront distribution, allowing only
CloudFront to access the S3 content.
Enable AWS WAF Integrate your CloudFront distribution with
AWS Web Application Firewall (WAF) to
protect your content from common web
exploits and attacks.
Enable AWS Shield Enable AWS Shield to protect your CloudFront
distribution from Distributed Denial of Service
(DDoS) attacks.
Use CloudFront signed URLs or signed Secure your CloudFront content by using
cookies signed URLs or signed cookies to restrict
access to your content.
Enable real-time logs Enable real-time logs in CloudFront to monitor
and analyze access patterns and identify
potential security risks.
Enable access logs Enable access logs for your CloudFront
distribution to capture detailed information
about viewer requests.
Use Geo Restriction Configure geo restriction to control which
countries can access your CloudFront content.
Implement Lambda@Edge Use Lambda@Edge to customize and secure
your CloudFront content by running Lambda
functions at the edge locations.
Enable CloudTrail integration Integrate your CloudFront distribution with
AWS CloudTrail to capture and store data
events for auditing and compliance purposes.
Enable AWS Config Enable AWS Config to continuously monitor
and record your CloudFront distribution
configurations and evaluate them against best
practices.
Use Amazon GuardDuty Enable Amazon GuardDuty to continuously
monitor and detect threats to your CloudFront
distributions and AWS accounts.