CRITICAL
Source
Trivy
ID
AVD-NIF-0001

An ingress security group rule allows traffic from /0.

Opening up ports to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that explicitly require it where possible. When publishing web applications, use a load balancer instead of publishing directly to instances.

Impact

Your port exposed to the internet

Follow the appropriate remediation steps below to resolve the issue.

Set a more restrictive cidr range

1
2
3
4
5
 resource "nifcloud_security_group_rule" "good_example" {
 	type    = "IN"
 	cidr_ip = "10.0.0.0/16"
 }
 
1
2
3
4
5
6
7
8
9
resource "nifcloud_security_group_rule" "allow_partner_rsync" {
  type                 = "IN"
  security_group_names = [nifcloud_security_group..group_name]
  from_port            = 22
  to_port              = 22
  protocol             = "TCP"
  cidr_ip              = "10.0.0.0/16"
}