When SSL/TLS termination is configured on a load balancer, what is the effect on the backend servers?
Think about where the encryption ends when SSL/TLS termination is used.
SSL/TLS termination means the load balancer decrypts the traffic before sending it to backend servers, so backend servers get unencrypted traffic.
You have a web application hosted on AWS behind an Application Load Balancer (ALB). You want to secure client connections with HTTPS. Which option correctly describes where SSL/TLS termination should be configured for best practice?
Consider where it is easier to manage certificates and reduce backend load.
Terminating SSL/TLS at the ALB centralizes certificate management and reduces CPU load on backend servers.
What is a potential security risk when SSL/TLS termination is done at the load balancer and traffic between the load balancer and backend servers is unencrypted?
Think about what happens to data after decryption at the load balancer.
After SSL/TLS termination, traffic between load balancer and backend is unencrypted. If the internal network is not secure, attackers could intercept this traffic.
Which AWS CLI command correctly creates an HTTPS listener on an existing Application Load Balancer with SSL/TLS termination using a specified certificate ARN?
Remember HTTPS uses port 443 and the protocol must be HTTPS for SSL termination.
The correct command uses protocol HTTPS on port 443 with the certificate ARN specified to enable SSL/TLS termination on the ALB listener.
You have a multi-tier web application in AWS with a public Application Load Balancer (ALB) in front, an internal Network Load Balancer (NLB) for backend services, and EC2 instances behind the NLB. You want to ensure end-to-end encryption with minimal latency and simplified certificate management. Which SSL/TLS termination strategy is best?
Consider how to keep encryption end-to-end while managing certificates efficiently.
Terminating SSL/TLS at ALB and re-encrypting to NLB, then terminating again at backend ensures encryption on every segment. It balances security and certificate management.