Severity Framework
Snyk CCSS
Rule category
Network / Best Practices
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
CIS-Controls
CSA-CCM
ISO-27001
NIST-800-53
PCI-DSS
SOC-2
- Snyk ID SNYK-CC-00031
- credit Snyk Research Team
Description
Because inbound traffic is allowed to a resource from any source instead of a restricted range, potentially everyone can access your resource.
How to fix?
Set ingress.cidr_blocks
attribute with a more restrictive CIDR block, for example 192.16.0.0/24
.
Example Configuration
resource "aws_security_group" "ingress-single-cidr-80-80" {
name = "ingress-single-cidr-80-80"
vpc_id = aws_vpc.main.id
ingress {
from_port = 80
to_port = 80
protocol = "tcp"
cidr_blocks = ["192.16.0.0/24"]
}
}