/0
TF-AWS006Opening up unwanted CIDR ranges to the public internet is generally to be avoided.
Restrict access to IP addresses or ranges that explicitly require it where possible.
Specifying a non-restrictive IP range allows unauthorized traffic from accessing your internal networks and causing unwanted problems. Specify a restrictive source IP range in the cidr_blocks
attribute.
resource "aws_security_group_rule" "my-rule" {
type = "ingress"
cidr_blocks = ["0.0.0.0/0"]
}
resource "aws_security_group_rule" "my-rule" {
type = "ingress"
cidr_blocks = ["10.0.0.0/16"]
}