Data at risk

Connections to Redshift cluster not encrypted in transit

Risk Level

Informational (4)



An Amazon Redshift cluster consists of nodes. Each cluster has a leader node and one or more compute nodes. The leader node receives queries from client applications, parses the queries, and develops query execution plans. The leader node coordinates the parallel execution of these plans with the compute nodes and aggregates the intermediate results from these nodes. It then finally returns the results back to the client applications. It was detected that the Redshift cluster {AwsRedshiftCluster} connections are not encrypted in transit. Transport Layer Security (TLS) can be used to help prevent potential attackers from using man-in-the-middle (MiTM) or similar attacks to eavesdrop on or manipulate network traffic. It is recommended to allow only encrypted connections over TLS.
  • Recommended Mitigation

    It is recommended to update the parameter group to require encryption - set require_SSL parameter to True. If you want to use different parameter values than the default parameter group, you must create a custom parameter group and then associate your cluster with it, the default parameter group can not be modified. You might need to restart the cluster for the updated parameter values to take effect.