Skip to main content

πŸ”Œ AWS EC2 Security Group Rule - object.extracts.yaml

  • Contextual name: πŸ”Œ object.extracts.yaml
  • ID: /types/CA10__CaAwsSecurityGroupRule2__c/object.extracts.yaml
  • Located in: πŸ“• AWS EC2 Security Group Rule

Used In​

LogicPolicyFlags
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted CIFS traffic 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted DNS traffic 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted FTP traffic 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted ICMP traffic 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted NetBIOS traffic 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted RPC traffic 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted SMTP traffic 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted traffic to all ports 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted traffic to MongoDB 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted traffic to MSSQL 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted traffic to MySQL 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted traffic to PostgreSQL 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted Telnet traffic 🟒🟒 x3

Content​

Open File

---
extracts:
# Values: IP, Group, PrefixList. Nullable, it can be prefix list if empty. Can't have no access, retrieved via ec2:DescribeSecurityGroups
- name: "CA10__source__c"
value:
FIELD:
path: "CA10__source__c"
# Values: IPv4, IPv6. Nullable it is not the IP source if empty. Can't have no access, retrieved via ec2:DescribeSecurityGroups
- name: "CA10__sourceIpVersion__c"
value:
FIELD:
path: "CA10__sourceIpVersion__c"
# Nullable. Can't have no access, retrieved via ec2:DescribeSecurityGroups
- name: "CA10__sourceIpRange__c"
value:
FIELD:
path: "CA10__sourceIpRange__c"
# Values: Inbound, Outbound. Not nullable. Can't have no access, retrieved via ec2:DescribeSecurityGroups
- name: "CA10__direction__c"
value:
FIELD:
path: "CA10__direction__c"
undeterminedIf:
isEmpty: "Corrupted data. Rule Action cannot be empty."
# Not nullable. Can't have no access, retrieved via ec2:DescribeSecurityGroups
- name: "CA10__protocol__c"
value:
FIELD:
path: "CA10__protocol__c"
undeterminedIf:
isEmpty: "Corrupted data. Protocol cannot be empty."
# Nullable. Can't have no access, retrieved via ec2:DescribeSecurityGroups
- name: "CA10__fromPort__c"
value:
FIELD:
path: "CA10__fromPort__c"
# Nullable. Can't have no access, retrieved via ec2:DescribeSecurityGroups
- name: "CA10__toPort__c"
value:
FIELD:
path: "CA10__toPort__c"