Skip to Content
Programming Amazon Web Services
book

Programming Amazon Web Services

by James Murty
March 2008
Intermediate to advanced
604 pages
18h 38m
English
O'Reilly Media, Inc.
Content preview from Programming Amazon Web Services

Security Groups

The EC2 environment provides a network security mechanism that acts as a firewall for incoming connections. The environment does not allow network traffic to reach an instance unless that traffic has been explicitly permitted.

The network security firewall is managed using security groups, which are named collections of access rules that specify which incoming (ingress) network connections the EC2 environment should allow to pass through to running instances. Security groups only control inbound network traffic; they will not prevent outbound traffic.

Security groups can contain two kinds of rules: IP rules and group rules.

IP rules

IP access rules, also known as CIDR rules, control traffic originating from outside or inside the EC2 environment. These rules specify the kinds of IP network traffic that will be allowed based on three constraints:

  • Protocol (TCP, UDP, or ICMP)

  • Target port range

  • Originating IP address range

We discussed IP rules and the API operation that applies to them in more detail earlier on, in the section Allow IP Traffic.”

Group rules

Group access rules control traffic originating from other instances within the EC2 environment. These rules define permissions based on which security groups an instance belongs to, rather than its IP address. Group rules are much less granular than IP rules and will automatically allow incoming network traffic, using any protocol or port number, from an instance belonging to a permitted security group.

Group rules are a convenient ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

AWS SysOps Cookbook - Second Edition

AWS SysOps Cookbook - Second Edition

Eric Z. Beard, Rowan Udell, Lucas Chan

Publisher Resources

ISBN: 9780596515812Errata Page