Policy: AWS > VPC > Security Group > Egress Rules > Approved > CIDR Ranges
Custom Security Group egress rules may only be added within the specified CIDR address ranges. Acceptable values are valid CIDR blocks. If this list is empty, no CIDR address ranges are permitted.
Applies to non-Turbot managed Security Groups.
Examples: - 10.0.0.0/8 - 172.16.0.0/12 - ::/0 - 2600:1f18:2368:f300::/56 - 2001:db8:1234:1a00:3304:8879:34cf:4071
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Specification
Schema Type |
|
---|---|
Default |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/resourceApproved
- tmod:@turbot/aws-vpc-security#/policy/types/securityGroupEgressRulesApprovedCidrRanges
- turbot graphql policy-type --id "tmod:@turbot/aws-vpc-security#/policy/types/securityGroupEgressRulesApprovedCidrRanges"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-vpc-security#/policy/types/securityGroupEgressRulesApprovedCidrRanges"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI