Policy: AWS > VPC > Security Group > Egress Rules > Approved > Prohibited Ports
A YAML list of ports that are prohibited and may not be used for egress in custom security groups. For example, 21 might be prohibited to prevent the use of FTP. This list is also applied to ICMP rules, so should be checked against valid ICMP numbers.
Applies to non-Turbot managed Security Groups.
Examples: - 21 # FTP - 25 # SMTP
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Specification
Schema Type |
|
---|---|
Default |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/resourceApproved
- tmod:@turbot/aws-vpc-security#/policy/types/securityGroupEgressRulesApprovedProhibitedPorts
- turbot graphql policy-type --id "tmod:@turbot/aws-vpc-security#/policy/types/securityGroupEgressRulesApprovedProhibitedPorts"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-vpc-security#/policy/types/securityGroupEgressRulesApprovedProhibitedPorts"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI