42 resource "aws_security_group" "api_ingress" {
43 name = "api-ingress"
44 vpc_id = var.vpc_id
45 ingress {
46 from_port = 443
47 protocol = "tcp"
48 - cidr_blocks = ["10.0.0.0/8"]
49 + cidr_blocks = ["0.0.0.0/0"]
SANDBOX AUDIT
cidr_blockscidr_blocks widens 443 from the VPC range to the public internet. Restrict this rule to the edge proxy CIDR or front it with the WAF.