-
-
Notifications
You must be signed in to change notification settings - Fork 177
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Optional or no egress rule in default security group #117
Comments
This is being worked on with major refactoring taking place in the https://github.com/cloudposse/terraform-aws-security-group module. Once the open PRs there are merged and this repo uses that module, then it will be much easier to overwrite this rule. |
Are we still waiting for the terraform-aws-security-group module to be merged? |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the Feature
In our pipeline for terraform we ran tf_sec as well which marks a outbound sg rule with protocol -1 and cidr blocks 0.0.0.0/0
A RDS Security Group doesn't need a outbound rule as the SGs are stateful. therefore all requests will be answered and the db itself will not initate a connection
Use Case
use the module and check it with tf_sec without findings
Describe Ideal Solution
Alternatives Considered
Explain what alternative solutions or features you've considered.
Additional Context
relates to this resource
The text was updated successfully, but these errors were encountered: