LOW

Ensure CloudFront distributions have custom error pages configured

Custom error pages prevent exposure of technical error details and provide better user experience during errors or maintenance.

Security Impact

Default error pages may reveal technology stack, origin details, and other information useful for reconnaissance.

How to Remediate

Configure custom error responses for 4xx and 5xx errors to serve user-friendly pages that don't reveal infrastructure details.

Affected Resources

AWS::CloudFront::Distribution

Compliance Frameworks

OWASPInformation Disclosure Prevention

How TigerGate Helps

TigerGate continuously monitors your AWS environment to detect and alert on this misconfiguration. Here's what our platform does for this specific check:

  • Continuous Scanning

    Automatically scans all Amazon CloudFront resources across your AWS accounts every hour

  • Instant Alerts

    Get notified via Slack, email, or webhooks when this misconfiguration is detected

  • One-Click Remediation

    Fix this issue directly from the TigerGate dashboard with our guided remediation

  • Compliance Evidence

    Automatically collect audit evidence for OWASP, Information Disclosure Prevention compliance

  • Drift Detection

    Get alerted if this configuration drifts back to an insecure state after remediation

Check Details

Check ID
aws-cloudfront-19
Service
Amazon CloudFront
Category
Security Configuration
Severity
LOW

Automate This Check

TigerGate automatically scans your AWS environment for this and 575+ other security checks.

Start Free Trial