github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/avd_docs/aws/cloudfront/AVD-AWS-0013/Management_Console.md (about) 1 1. Log into the AWS Management Console. 2 2. Select the "Services" option and search for CloudFront.  3 3. Select the "CloudFront Distribution" that needs to be verified. 4 4. Click the "Distribution Settings" button from menu to get into the "CloudFront Distribution" configuration page.  5 5. Click the "Edit" button from the General tab on the top menu.  6 6. Scroll down and choose the "Security Policy" that you want CloudFront to use for HTTPS connections and must use TLSv1.1 or higher SSL protocols. 7 7. Scroll down and click on "Yes,Edit" to save the changes. 8 8. Repeat the steps number 5 and 6 to establish any other "CloudFront Distribution" is not using an insecure SSL protocol for HTTPS traffic.