When you add HTTPS listeners, you can select appropriate security policies to improve security. A security policy is a combination of TLS protocols and cipher suites.
Security Policy |
Description |
TLS Versions |
Cipher Suites |
---|---|---|---|
TLS-1-0 |
TLS 1.0, TLS 1.1, and TLS 1.2 and supported cipher suites (high compatibility and moderate security) |
TLS 1.2 TLS 1.1 TLS 1.0 |
|
TLS-1-1 |
TLS 1.1 and TLS 1.2 and supported cipher suites (moderate compatibility and moderate security) |
TLS 1.2 TLS 1.1 |
|
TLS-1-2 |
TLS 1.2 and supported cipher suites (moderate compatibility and high security) |
TLS 1.2 |
|
TLS-1-2-Strict |
Strict TLS 1.2 and supported cipher suites (low compatibility and ultra-high security) |
TLS 1.2 |
|
TLS-1-0-WITH-1-3 (for dedicated load balancers) |
TLS 1.0 and later, and supported cipher suites (ultra-high compatibility and low security) |
TLS 1.3 TLS 1.2 TLS 1.1 TLS 1.0 |
|
TLS-1-2-FS-WITH-1-3 (for dedicated load balancers) |
TLS 1.2 and later, and supported forward secrecy cipher suites (high compatibility and ultra-high security) |
TLS 1.3 TLS 1.2 |
|
TLS-1-2-FS (for dedicated load balancers) |
TLS 1.2 and supported forward secrecy cipher suites (moderate compatibility and ultra-high security) |
TLS 1.2 |
|
This table lists the cipher suites supported by ELB. Generally, clients also support multiple cipher suites. In actual use, the intersection of the cipher suites supported by ELB and those supported by clients is used, and the cipher suites supported by ELB take precedence.
Security Policy |
TLS-1-0 |
TLS-1-1 |
TLS-1-2 |
TLS-1-2-Strict |
TLS-1-0-WITH-1-3 |
TLS-1-2-FS-WITH-1-3 |
TLS-1-2-FS |
---|---|---|---|---|---|---|---|
TLS versions |
|||||||
TLS 1.3 |
- |
- |
- |
- |
√ |
√ |
√ |
TLS 1.2 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
TLS 1.1 |
√ |
√ |
- |
- |
√ |
- |
- |
TLS 1.0 |
√ |
- |
- |
- |
√ |
- |
- |
Cipher suite |
|||||||
EDHE-RSA-AES128-GCM-SHA256 |
√ |
√ |
√ |
√ |
- |
- |
- |
ECDHE-RSA-AES256-GCM-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-RSA-AES128-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-RSA-AES256-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
AES128-GCM-SHA256 |
√ |
√ |
√ |
√ |
√ |
- |
- |
AES256-GCM-SHA384 |
√ |
√ |
√ |
√ |
√ |
- |
- |
AES128-SHA256 |
√ |
√ |
√ |
√ |
√ |
- |
- |
AES256-SHA256 |
√ |
√ |
√ |
√ |
√ |
- |
- |
ECDHE-RSA-AES128-SHA |
√ |
√ |
√ |
- |
√ |
- |
- |
ECDHE-RSA-AES256-SHA |
√ |
√ |
√ |
- |
√ |
- |
- |
AES128-SHA |
√ |
√ |
√ |
- |
√ |
- |
- |
AES256-SHA |
√ |
√ |
√ |
- |
√ |
- |
- |
ECDHE-ECDSA-AES128-GCM-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES128-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES128-SHA |
√ |
√ |
√ |
- |
√ |
- |
- |
ECDHE-ECDSA-AES256-GCM-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES256-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES256-SHA |
√ |
√ |
√ |
- |
√ |
- |
- |
ECDHE-RSA-AES128-GCM-SHA256 |
- |
- |
- |
- |
√ |
√ |
√ |
TLS_AES_256_GCM_SHA384 |
- |
- |
- |
- |
√ |
√ |
√ |
TLS_CHACHA20_POLY1305_SHA256 |
- |
- |
- |
- |
√ |
√ |
√ |
TLS_AES_128_GCM_SHA256 |
- |
- |
- |
- |
√ |
√ |
√ |
TLS_AES_128_CCM_8_SHA256 |
- |
- |
- |
- |
√ |
√ |
√ |
TLS_AES_128_CCM_SHA256 |
- |
- |
- |
- |
√ |
√ |
√ |
When you change a security policy, ensure that the security group containing backend servers allows traffic from 100.125.0.0/16 to backend servers and allows ICMP packets for UDP health checks. Otherwise, backend servers will be considered unhealthy, and routing will be affected.