cloudposse / terraform-aws-eks-node-group

Terraform module to provision a fully managed AWS EKS Node Group
https://cloudposse.com/accelerate
Apache License 2.0
91 stars 128 forks source link

Remove ssh-egress security group rule #179

Open m-wynn opened 6 months ago

m-wynn commented 6 months ago

what

⚠️ This might break environments for people who are accidentally relying on the wide security group rules for non-ssh outbound access. However it will allow others to be more secure and tighten down their security posture.

why

AWS Security Groups are stateful, meaning that any inbound traffic that is allowed will automatically permit the return outbound traffic, regardless of outbound rules. Security Groups track TCP connections in order to determine which packets are responses to allowed inbound traffic.

When you establish an SSH connection, you're initiating an inbound connection to the server. The server's response to your connection, as well as any subsequent communication, is considered outbound traffic from the perspective of the security group.

Because of the stateful nature of AWS Security Groups, once you've allowed inbound SSH traffic, the return traffic (outbound from the server) is automatically allowed, even if your outbound rules don't explicitly permit it.

Therefore, an outbound rule that allows traffic on all ports is not necessary for the operation of inbound SSH.

references