Title here
Summary here
postgres_fdw
) extension. You can use sample egress rules below when using postgres_fdw. (ONLY when using fdw extension) | Type | Protocol | Port Range | Destination | Description | |————–|———-|————|————-|————-| | Custom TCP | TCP | 5432 | | | ## AWS Security Group For Amazon RDS For MySQL / MariaDB {#h-aws-security-group-for-amazon-rds-for-mysql-mariadb} _ Amazon RDS For MySQL/MariaDB only need ingress rules to its service port both to master and/or read replica. MySQL/MariaDB default service port is 3306. _ replication between master and read replica doesn’t go through security group. ### Ingress Rules {#h-ingress-rules-3} | Type | Protocol | Port Range | Source | Description | |————–|———-|————|——–|————-| | Custom TCP | TCP | 3306 | | | ### Egress Rules {#h-egress-rules-3} Amazon RDS for MySQL/MariaDB doesn’t need egress rules for its operations. ## AWS Security Group For Amazon RDS For Oracle {#h-aws-security-group-for-amazon-rds-for-oracle} ### Ingress Rules {#h-ingress-rules-4} | Type | Protocol | Port Range | Source | Description | |————–|———-|————|——–|————-| | Custom TCP | TCP | 1521 | | | ### Egress Rules {#h-egress-rules-4} _ Amazon RDS For Oracle doesn’t need egress rules for its operations. ## AWS Security Group For Amazon RDS For SQL Server {#h-aws-security-group-for-amazon-rds-for-sql-server} _ Amazon RDS for SQL Server need inbound rule to its port (default SQL Server port is 1433). ### Ingress Rules {#h-ingress-rules-5} | Type | Protocol | Port Range | Source | Description | |————–|———-|————|——–|————-| | Custom TCP | TCP | 1433 | | | ### Egress Rules {#h-egress-rules-5} _ Amazon RDS for SQL Server doesn’t need outbound rules for its operation, you can leave the egress rules empty. ## AWS Security Group For Amazon Elasticsearch Service {#h-aws-security-group-for-amazon-elasticsearch-service} _ This only apply when you deploy Amazon Elasticsearch Service (Amazon ES) in VPC _ Amazon ES only need inbound rules from the application instance that will use the cluster and/or IP address that needs to access its kibana dashboard ### Ingress Rules {#h-ingress-rules-6} | Type | Protocol | Port Range | Source | Description | |————–|———-|————|——–|————-| | Custom TCP | TCP | 443 | | | ### Egress Rules {#h-egress-rules-6} ## AWS Security Group For AWS Elastic Load Balancer {#h-aws-security-group-for-aws-elastic-load-balancer} _ xxx. ### Ingress Rules {#h-ingress-rules-7} | Type | Protocol | Port Range | Source | Description | |————–|———-|————|——–|————-| | Custom TCP | TCP | 80 | | | | Custom TCP | TCP | 443 | | | ### Egress Rules {#h-egress-rules-7} | Type | Protocol | Port Range | Destination | Description | |————–|———-|————|————-|————-| | Custom TCP | TCP | | | | ## AWS Security Group For AWS Application Load Balancer {#h-aws-security-group-for-aws-application-load-balancer} _ xxx. ### Ingress Rules {#h-ingress-rules-8} | Type | Protocol | Port Range | Source | Description | |————–|———-|————|——–|————-| | Custom TCP | TCP | 80 | | | | Custom TCP | TCP | 443 | | | ### Egress Rules {#h-egress-rules-8} | Type | Protocol | Port Range | Destination | Description | |————–|———-|————|————-|————-| | Custom TCP | TCP | | | | ## AWS Security Group For Network Load Balancer {#h-aws-security-group-for-network-load-balancer} At the time of this writing (September 2020), AWS Network Load Balancer (NLB) doesn’t support security group attachment. ## AWS Security Group For DMS Replication Instance {#h-aws-security-group-for-dms-replication-instance} _ xxx. ### Ingress Rules {#h-ingress-rules-9} ### Egress Rules {#h-egress-rules-9} ## AWS Security Group For AWS Lambda {#h-aws-security-group-for-aws-lambda} _ This sample only apply if you’re deploying AWS Lambda in a VPC ### Ingress Rules {#h-ingress-rules-12} _ To be completely honest I haven’t found a use case for ingress rules for AWS Lambda ### Egress Rules {#h-egress-rules-12} _ Egress rule(s) for lambda will depend on the resource inside VPC that a lambda function needs to access. ## AWS Security Group For Bastion Host {#h-aws-security-group-for-bastion-host} ### Ingress Rules {#h-ingress-rules-13} ### Egress Rules {#h-egress-rules-13} _ To access the bastion host itself no egress rules needs to be added _ If you want to access EC2 instance / RDS database from bastion host, you need to allow bastion host security groups in the security groups attached to EC2 instance / RDS cluster. ## AWS Security Group For MongoDB Cluster {#h-aws-security-group-for-mongodb-cluster} _ The rules below only for MongoDB replication group to be accessible by application cluster and for replication process between replica member to succeed. ### Ingress Rules {#h-ingress-rules-14} ### Egress Rules {#h-egress-rules-14} ## AWS Security Group For Squid Proxy in EC2 {#h-aws-security-group-for-squid-proxy-in-ec2} * The example rules below assume you’re directly accessing squid proxy from and instance inside VPC ### Ingress Rules {#h-ingress-rules-20} ### Egress Rules {#h-egress-rules-20} ## AWS Security Group For Windows RDP {#h-aws-security-group-for-windows-rdp} ### Ingress Rules {#h-ingress-rules-21} ### Egress Rules {#h-egress-rules-21} ## AWS Security Group For SSH {#h-aws-security-group-for-ssh} ### Ingress Rules {#h-ingress-rules-24} ### Egress Rules {#h-egress-rules-24} [1]: https://www.howtodojo.com/aws-security-groups/