Security
Security Group Rule Builder
Design AWS security group rules with presets for common stacks. Add inbound and outbound rules, set protocols and CIDRs, then export as CloudFormation JSON or Terraform HCL.
Security Group Rule Builder
Export as CFN or TerraformBuild AWS security group rules visually. Add inbound/outbound rules and export as CloudFormation JSON or Terraform HCL.
| Direction | Protocol | From Port | To Port | Source / Dest CIDR | Description | |
|---|---|---|---|---|---|---|
CloudFormation JSON
{
"webserversg": {
"Type": "AWS::EC2::SecurityGroup",
"Properties": {
"GroupDescription": "webserversg security group",
"VpcId": {
"Ref": "VpcId"
},
"SecurityGroupIngress": [
{
"IpProtocol": "tcp",
"CidrIp": "0.0.0.0/0",
"Description": "HTTPS",
"FromPort": 443,
"ToPort": 443
}
]
}
}
}Best practices
- ✔Never open SSH (22) to 0.0.0.0/0 in production. Restrict to your IP.
- ✔Use separate security groups for web, app, and database tiers.
- ✔Prefer specific port ranges over allowing all traffic.
- ✔Add descriptions to every rule for audit trail clarity.
Need a full security architecture review?
We audit security groups, NACLs, and VPC configurations to ensure least-privilege access and compliance with AWS best practices.
Request a workshop →