Docs
ulb
Application Load Balancer ALB
Operation Guide
Security Management
TLS Security Policies

TLS Security Policy

When your deployed business needs to provide services to internet users, HTTPS encryption is generally used to ensure the secure transmission of data. For the HTTPS scenario, the security policy function provides the ability to configure the minimum version of the TLS protocol and the encryption algorithm suite. When creating and configuring HTTPS listening, you can bind your own security policy to ensure the security of your business and achieve the necessary security requirements.

Predefined Policy

Predefined policies do not support editing and deleting. The encryption suites and TLS protocols supported by the currently supported eight predefined policies are shown in the following table.

Policy NameMinimum TLS Protocol VersionSupported Encryption Suite
Native PolicyTLSv1OpenSSL syntax format ALL:!NULL:!aNULL:!DSS:!RC4:!RC2:!EXP:!LOW
TLS minimum version 1.2, high securityTLSv1.2ECDHE-ECDSA-AES128-CCMECDHE-ECDSA-AES128-CCM8ECDHE-ECDSA-AES128-GCM-SHA256ECDHE-ECDSA-AES128-SHAECDHE-ECDSA-AES128-SHA256ECDHE-ECDSA-AES256-CCMECDHE-ECDSA-AES256-CCM8ECDHE-ECDSA-AES256-GCM-SHA384ECDHE-ECDSA-AES256-SHAECDHE-ECDSA-AES256-SHA384ECDHE-ECDSA-CHACHA20-POLY1305ECDHE-RSA-AES128-GCM-SHA256ECDHE-RSA-AES128-SHAECDHE-RSA-AES128-SHA256ECDHE-RSA-AES256-GCM-SHA384ECDHE-RSA-AES256-SHAECDHE-RSA-AES256-SHA384ECDHE-RSA-CHACHA20-POLY1305
TLS minimum version 1.1, high securityTLSv1.1ECDHE-ECDSA-AES128-CCMECDHE-ECDSA-AES128-CCM8ECDHE-ECDSA-AES128-GCM-SHA256ECDHE-ECDSA-AES128-SHAECDHE-ECDSA-AES128-SHA256ECDHE-ECDSA-AES256-CCMECDHE-ECDSA-AES256-CCM8ECDHE-ECDSA-AES256-GCM-SHA384ECDHE-ECDSA-AES256-SHAECDHE-ECDSA-AES256-SHA384ECDHE-ECDSA-CHACHA20-POLY1305ECDHE-RSA-AES128-GCM-SHA256ECDHE-RSA-AES128-SHAECDHE-RSA-AES128-SHA256ECDHE-RSA-AES256-GCM-SHA384ECDHE-RSA-AES256-SHAECDHE-RSA-AES256-SHA384ECDHE-RSA-CHACHA20-POLY1305
TLS minimum version 1.0, high securityTLSv1ECDHE-ECDSA-AES128-CCMECDHE-ECDSA-AES128-CCM8ECDHE-ECDSA-AES128-GCM-SHA256ECDHE-ECDSA-AES128-SHAECDHE-ECDSA-AES128-SHA256ECDHE-ECDSA-AES256-CCMECDHE-ECDSA-AES256-CCM8ECDHE-ECDSA-AES256-GCM-SHA384ECDHE-ECDSA-AES256-SHAECDHE-ECDSA-AES256-SHA384ECDHE-ECDSA-CHACHA20-POLY1305ECDHE-RSA-AES128-GCM-SHA256ECDHE-RSA-AES128-SHAECDHE-RSA-AES128-SHA256ECDHE-RSA-AES256-GCM-SHA384ECDHE-RSA-AES256-SHAECDHE-RSA-AES256-SHA384ECDHE-RSA-CHACHA20-POLY1305
TLS minimum version 1.2, medium securityTLSv1.2AES128-CCMAES128-CCM8AES128-GCM-SHA256AES128-SHA256AES256-CCMAES256-CCM8AES256-GCM-SHA384AES256-SHA256ECDHE-ECDSA-AES128-CCMECDHE-ECDSA-AES128-CCM8ECDHE-ECDSA-AES128-GCM-SHA256ECDHE-ECDSA-AES128-SHAECDHE-ECDSA-AES128-SHA256ECDHE-ECDSA-AES256-CCMECDHE-ECDSA-AES256-CCM8ECDHE-ECDSA-AES256-GCM-SHA384ECDHE-ECDSA-AES256-SHAECDHE-ECDSA-AES256-SHA384ECDHE-ECDSA-CHACHA20-POLY1305ECDHE-RSA-AES128-GCM-SHA256ECDHE-RSA-AES128-SHAECDHE-RSA-AES128-SHA256ECDHE-RSA-AES256-GCM-SHA384ECDHE-RSA-AES256-SHAECDHE-RSA-AES256-SHA384ECDHE-RSA-CHACHA20-POLY1305
TLS minimum version 1.1, medium securityTLSv1.1AES128-CCMAES128-CCM8AES128-GCM-SHA256AES128-SHA256AES256-CCMAES256-CCM8AES256-GCM-SHA384AES256-SHA256ECDHE-ECDSA-AES128-CCMECDHE-ECDSA-AES128-CCM8ECDHE-ECDSA-AES128-GCM-SHA256ECDHE-ECDSA-AES128-SHAECDHE-ECDSA-AES128-SHA256ECDHE-ECDSA-AES256-CCMECDHE-ECDSA-AES256-CCM8ECDHE-ECDSA-AES256-GCM-SHA384ECDHE-ECDSA-AES256-SHAECDHE-ECDSA-AES256-SHA384ECDHE-ECDSA-CHACHA20-POLY1305ECDHE-RSA-AES128-GCM-SHA256ECDHE-RSA-AES128-SHAECDHE-RSA-AES128-SHA256ECDHE-RSA-AES256-GCM-SHA384ECDHE-RSA-AES256-SHAECDHE-RSA-AES256-SHA384ECDHE-RSA-CHACHA20-POLY1305
TLS minimum version 1.0, medium securityTLSv1AES128-CCMAES128-CCM8AES128-GCM-SHA256AES128-SHA256AES256-CCMAES256-CCM8AES256-GCM-SHA384AES256-SHA256ECDHE-ECDSA-AES128-CCMECDHE-ECDSA-AES128-CCM8ECDHE-ECDSA-AES128-GCM-SHA256ECDHE-ECDSA-AES128-SHAECDHE-ECDSA-AES128-SHA256ECDHE-ECDSA-AES256-CCMECDHE-ECDSA-AES256-CCM8ECDHE-ECDSA-AES256-GCM-SHA384ECDHE-ECDSA-AES256-SHAECDHE-ECDSA-AES256-SHA384ECDHE-ECDSA-CHACHA20-POLY1305ECDHE-RSA-AES128-GCM-SHA256ECDHE-RSA-AES128-SHAECDHE-RSA-AES128-SHA256ECDHE-RSA-AES256-GCM-SHA384ECDHE-RSA-AES256-SHAECDHE-RSA-AES256-SHA384ECDHE-RSA-CHACHA20-POLY1305
Only TLS version change, minimum version 1.2TLSv1.2-
Only TLS version change, minimum version 1.1TLSv1.1-

Differences between predefined policies, see the following table

Minimum TLS version 1.2, high securityMinimum TLS version 1.1, high securityMinimum TLS version 1.0, high securityMinimum TLS version 1.2, medium securityMinimum TLS version 1.1, medium securityMinimum TLS version 1.0, medium security
ECDHE-ECDSA-AES128-CCM
ECDHE-ECDSA-AES128-CCM8
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-ECDSA-AES128-SHA
ECDHE-ECDSA-AES128-SHA256
ECDHE-ECDSA-AES256-CCM
ECDHE-ECDSA-AES256-CCM8
ECDHE-ECDSA-AES256-GCM-SHA384
ECDHE-ECDSA-AES256-SHA
ECDHE-ECDSA-AES256-SHA384
ECDHE-ECDSA-CHACHA20-POLY1305
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-RSA-AES128-SHA
ECDHE-RSA-AES128-SHA256
ECDHE-RSA-AES256-GCM-SHA384
ECDHE-RSA-AES256-SHA
ECDHE-RSA-AES256-SHA384
ECDHE-RSA-CHACHA20-POLY1305
AES128-CCM
AES128-CCM8
AES128-GCM-SHA256
AES128-SHA256
AES256-CCM
AES256-CCM8
AES256-GCM-SHA384
AES256-SHA256

Explanation:

  1. The maximum protocol version of TLS can support up to TLSv1.3. If using TLSv1.3 for negotiation, the corresponding default encryption suite is:
  • TLS_AES_128_GCM_SHA256
  • TLS_AES_256_GCM_SHA384
  • TLS_CHACHA20_POLY1305_SHA256
  1. In addition to the six predefined policies in the table above, there are the following two. Their encryption algorithm suite is consistent with the native policy:
  • security-tls12o, only TLS version change, minimum version 1.2
  • security-tls11o, only TLS version change, minimum version 1.1
  1. The high-security policy in the predefined policy supports the encryption suite in the ALB environment, which is equivalent to the syntax
ALL:!NULL:!aNULL:!DSS:!RC4:!RC2:!EXP:!LOW:!SSLv3:!CAMELLIA:!ARIA:!3DES:!DH:!DHE:!RSA
  1. The medium-security policy in the predefined policy supports the encryption suite in the ALB environment, which is equivalent to the syntax
ALL:!NULL:!aNULL:!DSS:!RC4:!RC2:!EXP:!LOW:!SSLv3:!CAMELLIA:!ARIA:!3DES:!DH:!DHE

Custom Policy

You can define the policy you need by combining the minimum version of the TLS protocol and the encryption algorithm suite.

Create Custom Policy

  1. Log in to the Application Load Balancer (ALB) Console.
  2. Select Security Policy Management.
  1. On the Security Policy List page, click Create Security Group Policy.

  2. In the Create Security Policy dialog, complete the following parameter configuration, and click Create after the configuration is complete.

Configuration ItemDescription
NameEnter a custom policy name.
Minimum TLS Protocol VersionThe minimum version of the TLS protocol, a required item, the optional TLS versions are TLSv1, TLSv1.1, TLSv1.2
Encryption Algorithm SuiteSelect the encryption algorithm suite supported by the TLS version.
  1. Once the custom policy is created, you can select the custom policy in the advanced settings when creating HTTPS listening.

Delete Single Custom Security Policy

  1. Log in to the Application Load Balancer (ALB) Console.
  2. Select Security Policy Management.
  1. On the Security Policy List page, select the custom security policy you want to delete and click Delete.

  2. In the second confirmation pop-up window, confirm whether it is the security policy you want to delete.

  3. Click OK to complete the deletion operation.

Bulk Delete Custom Security Policies

  1. Log in to the Application Load Balancer (ALB) Console.
  2. Select Security Policy Management.
  1. On the Security Policy List page, batch select the checkboxes on the left of the security policies you want to delete, and click delete above.

  2. In the second confirmation pop-up window, confirm whether it is the security policy you want to delete.

  3. Click OK to complete the deletion operation.

If you want to delete a custom policy, you must first unbind VServer before you can delete it.

Edit Custom Security Policy

You can update custom security group policies as needed.

  1. Log in to the Application Load Balancer (ALB) Console.

  2. Select Security Policy Management.

  3. On the Security Policy List page, select the custom policy you want to edit and click edit in the operation bar.

  1. Set the following information in the Edit Security Group Policy dialog box:
Configuration ItemDescription
NameEnter a custom policy name.
Minimum TLS Protocol VersionThe minimum version of the TLS protocol, a required item, the optional TLS versions are TLSv1, TLSv1.1, TLSv1.2
Encryption Algorithm SuiteSelect the encryption algorithm suite supported by the TLS version.
  1. Click OK after the modification to complete the editing operation.