An egress security group rule allows traffic to /0.
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
Impact
Recommended Actions
Follow the appropriate remediation steps below to resolve the issue.
Set a more restrictive cidr range
1
2
3
4
5
6
7
8
9
10
11
12
AWSTemplateFormatVersion:"2010-09-09"Description:Good example of egress ruleResources:BadSecurityGroup:Type:AWS::EC2::SecurityGroupProperties:GroupDescription:Limits security group egress trafficSecurityGroupEgress:- CidrIp:127.0.0.1/32IpProtocol:"6"