|
@@ -68,7 +68,7 @@ resource "aws_security_group_rule" "phantom_server_outbound_postgres" {
|
|
resource "aws_security_group_rule" "phantom_server_outbound_udp_dns" {
|
|
resource "aws_security_group_rule" "phantom_server_outbound_udp_dns" {
|
|
security_group_id = aws_security_group.phantom_server.id
|
|
security_group_id = aws_security_group.phantom_server.id
|
|
type = "egress"
|
|
type = "egress"
|
|
- cidr_blocks = ["0.0.0.0/0"]
|
|
|
|
|
|
+ cidr_blocks = ["0.0.0.0/0"] #tfsec:ignore:aws-vpc-no-public-egress-sgr
|
|
from_port = 53
|
|
from_port = 53
|
|
to_port = 53
|
|
to_port = 53
|
|
protocol = "tcp"
|
|
protocol = "tcp"
|
|
@@ -78,7 +78,7 @@ resource "aws_security_group_rule" "phantom_server_outbound_udp_dns" {
|
|
resource "aws_security_group_rule" "phantom_server_outbound_tcp_dns" {
|
|
resource "aws_security_group_rule" "phantom_server_outbound_tcp_dns" {
|
|
security_group_id = aws_security_group.phantom_server.id
|
|
security_group_id = aws_security_group.phantom_server.id
|
|
type = "egress"
|
|
type = "egress"
|
|
- cidr_blocks = ["0.0.0.0/0"]
|
|
|
|
|
|
+ cidr_blocks = ["0.0.0.0/0"] #tfsec:ignore:aws-vpc-no-public-egress-sgr
|
|
from_port = 53
|
|
from_port = 53
|
|
to_port = 53
|
|
to_port = 53
|
|
protocol = "udp"
|
|
protocol = "udp"
|
|
@@ -88,7 +88,7 @@ resource "aws_security_group_rule" "phantom_server_outbound_tcp_dns" {
|
|
resource "aws_security_group_rule" "phantom_server_outbound_http" {
|
|
resource "aws_security_group_rule" "phantom_server_outbound_http" {
|
|
security_group_id = aws_security_group.phantom_server.id
|
|
security_group_id = aws_security_group.phantom_server.id
|
|
type = "egress"
|
|
type = "egress"
|
|
- cidr_blocks = ["0.0.0.0/0"]
|
|
|
|
|
|
+ cidr_blocks = ["0.0.0.0/0"] #tfsec:ignore:aws-vpc-no-public-egress-sgr
|
|
from_port = 80
|
|
from_port = 80
|
|
to_port = 80
|
|
to_port = 80
|
|
protocol = "tcp"
|
|
protocol = "tcp"
|
|
@@ -98,7 +98,7 @@ resource "aws_security_group_rule" "phantom_server_outbound_http" {
|
|
resource "aws_security_group_rule" "phantom_server_outbound_https" {
|
|
resource "aws_security_group_rule" "phantom_server_outbound_https" {
|
|
security_group_id = aws_security_group.phantom_server.id
|
|
security_group_id = aws_security_group.phantom_server.id
|
|
type = "egress"
|
|
type = "egress"
|
|
- cidr_blocks = ["0.0.0.0/0"]
|
|
|
|
|
|
+ cidr_blocks = ["0.0.0.0/0"] #tfsec:ignore:aws-vpc-no-public-egress-sgr
|
|
from_port = 443
|
|
from_port = 443
|
|
to_port = 443
|
|
to_port = 443
|
|
protocol = "tcp"
|
|
protocol = "tcp"
|