/0
TF-AWS009Opening up unwanted CIDR ranges to the public internet is generally to be avoided.
You should restrict access to IP addresses or ranges that explicitly require it where possible.
resource "aws_security_group" "my-group" {
egress {
cidr_blocks = ["0.0.0.0/0"]
}
}
resource "aws_security_group" "my-group" {
egress {
cidr_blocks = ["1.2.3.4/32"]
}
}