include::../description.adoc[] include::../recommended.adoc[] == Noncompliant Code Example An ingress rule allowing all inbound SSH traffic for AWS: [source,terraform] ---- resource "aws_security_group" "noncompliant" { name = "allow_ssh_noncompliant" description = "allow_ssh_noncompliant" vpc_id = aws_vpc.main.id ingress { description = "SSH rule" from_port = 22 to_port = 22 protocol = "tcp" cidr_blocks = ["0.0.0.0/0"] # Noncompliant } } ---- A security rule allowing all inbound SSH traffic for Azure: [source,terraform] ---- resource "azurerm_network_security_rule" "noncompliant" { priority = 100 direction = "Inbound" access = "Allow" protocol = "Tcp" source_port_range = "*" destination_port_range = "22" source_address_prefix = "*" # Noncompliant destination_address_prefix = "*" } ---- == Compliant Solution An ingress rule allowing inbound SSH traffic from specific IP addresses for AWS: [source,terraform] ---- resource "aws_security_group" "compliant" { name = "allow_ssh_compliant" description = "allow_ssh_compliant" vpc_id = aws_vpc.main.id ingress { description = "SSH rule" from_port = 22 to_port = 22 protocol = "tcp" cidr_blocks = ["1.2.3.0/24"] } } ---- A security rule allowing inbound SSH traffic from specific IP addresses for Azure: [source,terraform] ---- resource "azurerm_network_security_rule" "compliant" { priority = 100 direction = "Inbound" access = "Allow" protocol = "Tcp" source_port_range = "*" destination_port_range = "22" source_address_prefix = "1.2.3.0" destination_address_prefix = "*" } ---- include::../see.adoc[]