/0
TF-AWS007Opening up unwanted CIDR ranges to connect out to the public internet is generally to be avoided.
You should restrict access to IP addresses or ranges that are explicitly required where possible. Specifying a non-restrictive IP range allows your infrastructure to send traffic to unauthorized IP ranges. Specify a restrictive source IP range in the cidr_blocks attribute.
resource "aws_security_group_rule" "my-rule" {
type = "egress"
cidr_blocks = ["0.0.0.0/0"]
}
resource "aws_security_group_rule" "my-rule" {
type = "egress"
cidr_blocks = ["10.0.0.0/16"]
}