Severity Framework
Snyk CCSS
Rule category
Network / Ports
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
- Snyk ID SNYK-CC-00092
- credit Snyk Research Team
Description
Removing unfettered connectivity to a PostgreSQL server reduces its exposure to risk.
How to fix?
Set the ingress.cidr_blocks
attribute with a more restrictive CIDR block, for example 192.16.0.0/24
.
Example Configuration
resource "aws_security_group" "allow_some_cidr_valid" {
name = "allow_some_cidr_valid"
description = "Allow from valid CIDR"
ingress {
from_port = 5432
to_port = 5432
protocol = "tcp"
cidr_blocks = ["192.16.0.0/24"]
}
}