

# elbv2-acm-certificate-required
<a name="elbv2-acm-certificate-required"></a>

Checks if Application Load Balancers and Network Load Balancers have listeners that are configured to use certificates from Amazon Certificate Manager (ACM). This rule is NON\$1COMPLIANT if at least 1 load balancer has at least 1 listener that is configured without a certificate from ACM or is configured with a certificate different from an ACM certificate.



**Identifier:** ELBV2\$1ACM\$1CERTIFICATE\$1REQUIRED

**Resource Types:** AWS::ElasticLoadBalancingV2::LoadBalancer

**Trigger type:** Periodic

**Amazon Web Services Region:** All supported Amazon regions except Asia Pacific (New Zealand), Asia Pacific (Thailand), Asia Pacific (Jakarta), Middle East (UAE), Asia Pacific (Hyderabad), Asia Pacific (Osaka), Asia Pacific (Malaysia), Asia Pacific (Melbourne), Amazon GovCloud (US-East), Amazon GovCloud (US-West), Mexico (Central), Israel (Tel Aviv), Asia Pacific (Taipei), Canada West (Calgary), Europe (Spain), Europe (Zurich) Region

**Parameters:**

AcmCertificatesAllowed (Optional)Type: CSV  
Comma-separated list of certificate Amazon Resource Names (ARNs).

## Amazon CloudFormation template
<a name="w2aac20c16c17b7d771c19"></a>

To create Amazon Config managed rules with Amazon CloudFormation templates, see [Creating Amazon Config Managed Rules With Amazon CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).