An ingress security group rule allows traffic from /0.
Default Severity: critical
Explanation
Opening up ports to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that explicitly require it where possible.
Possible Impact
Your port exposed to the internet
Suggested Resolution
Set a more restrictive cidr range
Insecure Example
The following example will fail the aws-vpc-no-public-ingress-sgr check.
resource "aws_security_group_rule" "bad_example" {
type = "ingress"
cidr_blocks = ["0.0.0.0/0"]
}
Secure Example
The following example will pass the aws-vpc-no-public-ingress-sgr check.
resource "aws_security_group_rule" "good_example" {
type = "ingress"
cidr_blocks = ["10.0.0.0/16"]
}