Security

Security Group Rule Builder

Design AWS security group rules with presets for common stacks. Add inbound and outbound rules, set protocols and CIDRs, then export as CloudFormation JSON or Terraform HCL.

Security Group Rule Builder

Export as CFN or Terraform

Build AWS security group rules visually. Add inbound/outbound rules and export as CloudFormation JSON or Terraform HCL.

DirectionProtocolFrom PortTo PortSource / Dest CIDRDescription

CloudFormation JSON

{
  "webserversg": {
    "Type": "AWS::EC2::SecurityGroup",
    "Properties": {
      "GroupDescription": "webserversg security group",
      "VpcId": {
        "Ref": "VpcId"
      },
      "SecurityGroupIngress": [
        {
          "IpProtocol": "tcp",
          "CidrIp": "0.0.0.0/0",
          "Description": "HTTPS",
          "FromPort": 443,
          "ToPort": 443
        }
      ]
    }
  }
}

Best practices

  • ✔Never open SSH (22) to 0.0.0.0/0 in production. Restrict to your IP.
  • ✔Use separate security groups for web, app, and database tiers.
  • ✔Prefer specific port ranges over allowing all traffic.
  • ✔Add descriptions to every rule for audit trail clarity.

Need a full security architecture review?

We audit security groups, NACLs, and VPC configurations to ensure least-privilege access and compliance with AWS best practices.

Request a workshop →