security: narrow internal ingress CIDR (JIRA-4521)#446
security: narrow internal ingress CIDR (JIRA-4521)#446dylanratcliffe wants to merge 1 commit intomainfrom
Conversation
Open in Overmind ↗
🔴 Change SignalsPolicies 🔴 🔥 RisksRemoving NewCo 20/21 /32 ingress from customer whitelist SG will block their HTTPS access to the API Because the instance’s network interface uses this customer whitelist and no other attached rule permits those external sources, NewCo hosts connecting from those IPs will be blocked at the security group. Their HTTPS connections will fail, resulting in customer-visible API outages for those addresses. CIDR narrowing on internal-services SG will block cross‑VPC monitoring/NLB health checks to 10.0.101.240:9090 Once applied, source traffic from the monitoring VPC (10.50.x.x) will no longer match the 🟣 Expected Changes~ ec2-security-group › sg-03cf38efd953aa056--- current
+++ proposed
@@ -176,18 +176,4 @@
to_port: 443
- cidr_blocks:
- - 203.0.113.120/32
- description: NewCo 20
- from_port: 443
- protocol: tcp
- self: false
- to_port: 443
- - cidr_blocks:
- - 203.0.113.121/32
- description: NewCo 21
- from_port: 443
- protocol: tcp
- self: false
- to_port: 443
- - cidr_blocks:
- 203.0.113.16/30
description: Acme Corp
~ ec2-security-group › sg-089e5107637083db5--- current
+++ proposed
@@ -15,5 +15,5 @@
ingress:
- cidr_blocks:
- - 10.0.0.0/8
+ - 10.0.0.0/16
description: Health check endpoint
from_port: 8080
@@ -22,5 +22,5 @@
to_port: 8080
- cidr_blocks:
- - 10.0.0.0/8
+ - 10.0.0.0/16
description: Internal HTTPS - monitoring, service mesh, internal tools
from_port: 443
@@ -29,5 +29,5 @@
to_port: 443
- cidr_blocks:
- - 10.0.0.0/8
+ - 10.0.0.0/16
description: Prometheus metrics scraping
from_port: 9090
💥 Blast RadiusItems Edges |


Summary
Context
Testing
Rollout / Risk