@@ -18,7 +18,8 @@ describe("ApiGWMutualTls", () => {
1818 const ruleId = "ApiGWMutualTls"
1919 test ( "Non-compliant when mutual TLS is not enabled" , ( ) => {
2020 new CfnDomainName ( stack , "TestDomain" , {
21- domainName : "test.example.com"
21+ domainName : "test.example.com" ,
22+ securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 "
2223 } )
2324
2425 // Validate
@@ -27,6 +28,7 @@ describe("ApiGWMutualTls", () => {
2728 test ( "Compliant when mutual TLS is enabled" , ( ) => {
2829 new CfnDomainName ( stack , "TestDomain" , {
2930 domainName : "test.example.com" ,
31+ securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 " ,
3032 mutualTlsAuthentication : {
3133 truststoreUri : "truststoreUri" ,
3234 truststoreVersion : "truststoreVersion"
@@ -40,6 +42,7 @@ describe("ApiGWMutualTls", () => {
4042 test ( "Non-compliant when mutual TLS is missing trustStoreVersion" , ( ) => {
4143 new CfnDomainName ( stack , "TestDomain" , {
4244 domainName : "test.example.com" ,
45+ securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 " ,
4346 mutualTlsAuthentication : {
4447 truststoreUri : "truststoreUri"
4548 }
@@ -51,7 +54,8 @@ describe("ApiGWMutualTls", () => {
5154 test ( "Compliant when mutual TLS is not enabled in a pull request" , ( ) => {
5255 stack . node . setContext ( "isPullRequest" , true )
5356 new CfnDomainName ( stack , "TestDomain" , {
54- domainName : "test.example.com"
57+ domainName : "test.example.com" ,
58+ securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 "
5559 } )
5660
5761 // Validate
@@ -60,7 +64,8 @@ describe("ApiGWMutualTls", () => {
6064 test ( "Compliant when mutual TLS is not enabled in not a pull request" , ( ) => {
6165 stack . node . setContext ( "isPullRequest" , false )
6266 new CfnDomainName ( stack , "TestDomain" , {
63- domainName : "test.example.com"
67+ domainName : "test.example.com" ,
68+ securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 "
6469 } )
6570
6671 // Validate
0 commit comments