github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/avd_docs/aws/elb/AVD-AWS-0047/Management_Console.md (about) 1 1. Log into the AWS Management Console. 2 2. Select the "Services" option and search for EC2.  3 3. In the "EC2 Dashboard" scroll down and look for "Load Balancers" and click on "Load Balancers" to get into "Load Balancers" dashboard. 4 4. Select the "Load Balancer" which needs to be verified.  5 5. Select the "Listeners" tab from the bottom panel and scroll down to the "Cipher" column of HTTPS Listener and click on "Change" option. 6 6. From "Select a Cipher" panel select either of "Predefined Security Policy" and "Custom Security Policy". 7 7. Scan the "SSL Cipher Section" from selected "Security Policy" for any insecure ciphers. Refer to the link for all secure ciphers. https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-ssl-security-policy.html#ssl-ciphers  8 8. Scroll down and click on "Save" button to make the changes. 