securitygroup-server.tf 3.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. # SG Summary - Server
  2. # Ingress:
  3. # 22 - sync from other security centers
  4. # 443 - User access
  5. # Egress:
  6. # 25 - smtp
  7. # 443 - updates
  8. # tcp/1243 - "Communicating with Log Correlation Engine" (unneeded in xdr)
  9. # tcp/8834-8835 - Communicating With Nessus - to vpc-scanners
  10. resource "aws_security_group" "nessus_scanner" {
  11. name_prefix = "nessus_scanner"
  12. tags = merge( var.standard_tags, var.tags, { Name = "nessus_scanner" } )
  13. vpc_id = var.vpc_id
  14. description = "Nessus Security Scanner"
  15. }
  16. #-----------------------------------------------------------------
  17. # Inbound access
  18. #-----------------------------------------------------------------
  19. resource "aws_security_group_rule" "nessus_scanner_inbound_icmp" {
  20. security_group_id = aws_security_group.nessus_scanner.id
  21. type = "ingress"
  22. cidr_blocks = [ "10.0.0.0/8" ]
  23. from_port = -1
  24. to_port = -1
  25. protocol = "ICMP"
  26. description = "Inbound pings"
  27. }
  28. resource "aws_security_group_rule" "nessus_scanner_inbound_22" {
  29. security_group_id = aws_security_group.nessus_scanner.id
  30. type = "ingress"
  31. cidr_blocks = toset(concat(var.cidr_map["vpc-access"], var.cidr_map["vpc-private-services"]))
  32. from_port = 22
  33. to_port = 22
  34. protocol = "tcp"
  35. description = "Inbound ssh (from access)"
  36. }
  37. resource "aws_security_group_rule" "nessus_scanner_inbound_3022" {
  38. security_group_id = aws_security_group.nessus_scanner.id
  39. type = "ingress"
  40. cidr_blocks = var.cidr_map["vpc-access"]
  41. from_port = 3022
  42. to_port = 3022
  43. protocol = "tcp"
  44. description = "Inbound teleport (from access)"
  45. }
  46. resource "aws_security_group_rule" "nessus_scanner_inbound_443" {
  47. security_group_id = aws_security_group.nessus_scanner.id
  48. type = "ingress"
  49. cidr_blocks = toset(concat(var.cidr_map["vpc-access"], var.cidr_map["vpc-private-services"]))
  50. from_port = 443
  51. to_port = 443
  52. protocol = "tcp"
  53. description = "Inbound 443 (from access)"
  54. }
  55. resource "aws_security_group_rule" "nessus_scanner_inbound_nessus" {
  56. security_group_id = aws_security_group.nessus_scanner.id
  57. type = "ingress"
  58. cidr_blocks = toset(concat(var.cidr_map["vpc-access"], var.cidr_map["vpc-private-services"]))
  59. from_port = 8834
  60. to_port = 8835
  61. protocol = "tcp"
  62. description = "Inbound Nessus"
  63. }
  64. resource "aws_security_group_rule" "nessus_scanner_inbound_scan_ourselves" {
  65. security_group_id = aws_security_group.nessus_scanner.id
  66. source_security_group_id = aws_security_group.nessus_scanner.id
  67. type = "ingress"
  68. from_port = -1
  69. to_port = -1
  70. protocol = "all"
  71. description = "Inbound Scanning of Ourselves"
  72. }
  73. #-----------------------------------------------------------------
  74. # Outbound access
  75. #-----------------------------------------------------------------
  76. resource "aws_security_group_rule" "nessus_scanner_outbound_all_ports" {
  77. security_group_id = aws_security_group.nessus_scanner.id
  78. type = "egress"
  79. cidr_blocks = [ "0.0.0.0/0" ]
  80. from_port = -1
  81. to_port = -1
  82. protocol = "all"
  83. description = "Outbound to All Ports"
  84. }