feat(aws): add elbv2_listener_pqc_tls_enabled security check#11254
feat(aws): add elbv2_listener_pqc_tls_enabled security check#11254HugoPBrito wants to merge 2 commits into
Conversation
Add new security check elbv2_listener_pqc_tls_enabled for aws provider. Includes check implementation, metadata, and unit tests.
|
Preview deployment for your docs. Learn more about Mintlify Previews.
💡 Tip: Enable Workflows to automatically generate PRs for you. |
|
✅ Conflict Markers Resolved All conflict markers have been successfully resolved in this pull request. |
|
✅ All necessary |
Compliance Mapping ReviewThis PR adds new checks. Please verify that they have been mapped to the relevant compliance framework requirements. New checks already mapped in this PR
Use the |
Codecov Report✅ All modified and coverable lines are covered by tests.
Additional details and impacted files@@ Coverage Diff @@
## master #11254 +/- ##
===========================================
- Coverage 93.97% 6.98% -86.99%
===========================================
Files 237 857 +620
Lines 34829 25086 -9743
===========================================
- Hits 32729 1752 -30977
- Misses 2100 23334 +21234
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
🔒 Container Security ScanImage: 📊 Vulnerability Summary
5 package(s) affected
|
Context
"Harvest now, decrypt later" attacks capture TLS-encrypted traffic today with the intent to decrypt it once a cryptographically relevant quantum computer becomes available. Without post-quantum (PQ) TLS policies on ELBv2 listeners, sensitive data, credentials, and session tokens passing through load balancers are vulnerable to this forward-looking threat. AWS has published the
ELBSecurityPolicy-TLS13-*-PQ-2025-09policy family that adds hybrid key exchange (ML-KEM 768 + classical ECDHE), but the existing Prowler checkelbv2_insecure_ssl_ciphersfolds PQ policies into its generic "secure" allowlist without surfacing PQ readiness as a distinct signal.Description
This check evaluates every ELBv2 HTTPS (ALB) or TLS (NLB) listener's
SslPolicyagainst a configurable allowlist of post-quantum TLS policies. A load balancer passes when all its HTTPS/TLS listeners use a PQ policy from the approved set, and fails when any listener uses a policy outside that set — including modern but classical-only policies likeELBSecurityPolicy-TLS13-1-2-2021-06. HTTP listeners and non-TLS NLB listeners are skipped (no TLS termination). The PQ allowlist is configurable viaelbv2_listener_pqc_tls_allowed_policiesinaws_audit_configto accommodate future AWS policy releases. Remediation is to switch affected listeners toELBSecurityPolicy-TLS13-1-2-PQ-2025-09or another approved PQ policy.Steps to review
prowler/providers/aws/services/elbv2/elbv2_listener_pqc_tls_enabled/prowler/compliance/aws/to ensure the check is correctly mapped to relevant requirementspoetry run pytest tests/providers/aws/services/elbv2/elbv2_listener_pqc_tls_enabled/ -vChecklist
Community Checklist
SDK/CLI
License
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.