You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Security scanning is graciously provided by Bridgecrew. Bridgecrew is the leading fully hosted, cloud-native solution providing continuous Terraform security and compliance.
|[](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=cloudposse%2Fterraform-aws-ec2-instance&benchmark=CIS+KUBERNETES+V1.5)| Center for Internet Security, KUBERNETES Compliance |
78
+
|[](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=cloudposse%2Fterraform-aws-ec2-instance&benchmark=CIS+AWS+V1.2)| Center for Internet Security, AWS Compliance |
79
+
|[](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=cloudposse%2Fterraform-aws-ec2-instance&benchmark=CIS+AZURE+V1.1)| Center for Internet Security, AZURE Compliance |
80
+
|[](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=cloudposse%2Fterraform-aws-ec2-instance&benchmark=PCI-DSS+V3.2)| Payment Card Industry Data Security Standards Compliance |
81
+
|[](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=cloudposse%2Fterraform-aws-ec2-instance&benchmark=NIST-800-53)| National Institute of Standards and Technology Compliance |
82
+
|[](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=cloudposse%2Fterraform-aws-ec2-instance&benchmark=ISO27001)| Information Security Management System, ISO/IEC 27001 Compliance |
83
+
|[](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=cloudposse%2Fterraform-aws-ec2-instance&benchmark=SOC2)| Service Organization Control 2 Compliance |
84
+
|[](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=cloudposse%2Fterraform-aws-ec2-instance&benchmark=CIS+GCP+V1.1)| Center for Internet Security, GCP Compliance |
85
+
|[](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=cloudposse%2Fterraform-aws-ec2-instance&benchmark=HIPAA)| Health Insurance Portability and Accountability Compliance |
| additional\_ips\_count | Count of additional EIPs |`number`|`0`| no |
165
220
| additional\_tag\_map | Additional tags for appending to tags\_as\_list\_of\_maps. Not added to `tags`. |`map(string)`|`{}`| no |
166
-
| allowed\_ports | List of allowed ingress TCP ports |`list(number)`|`[]`| no |
167
-
| allowed\_ports\_udp | List of allowed ingress UDP ports |`list(number)`|`[]`| no |
168
221
| ami | The AMI to use for the instance. By default it is the AMI provided by Amazon with Ubuntu 16.04 |`string`|`""`| no |
169
222
| ami\_owner | Owner of the given AMI (ignored if `ami` unset) |`string`|`""`| no |
170
223
| applying\_period | The period in seconds over which the specified statistic is applied |`number`|`60`| no |
@@ -212,6 +265,7 @@ Available targets:
212
265
| root\_iops | Amount of provisioned IOPS. This must be set if root\_volume\_type is set to `io1`|`number`|`0`| no |
213
266
| root\_volume\_size | Size of the root volume in gigabytes |`number`|`10`| no |
214
267
| root\_volume\_type | Type of root volume. Can be standard, gp2 or io1 |`string`|`"gp2"`| no |
268
+
| security\_group\_rules | A list of maps of Security Group rules. <br>The values of map is fully complated with `aws_security_group_rule` resource. <br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`| <pre>[<br> {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br> ],<br> "from_port": 0,<br> "protocol": "-1",<br> "to_port": 65535,<br> "type": "egress"<br> }<br>]</pre> | no |
215
269
| security\_groups | List of Security Group IDs allowed to connect to the instance |`list(string)`|`[]`| no |
216
270
| source\_dest\_check | Controls if traffic is routed to the instance when the destination address does not match the instance. Used for NAT or VPNs |`bool`|`true`| no |
217
271
| ssh\_key\_pair | SSH key pair to be provisioned on the instance |`string`| n/a | yes |
| additional\_ips\_count | Count of additional EIPs |`number`|`0`| no |
22
22
| additional\_tag\_map | Additional tags for appending to tags\_as\_list\_of\_maps. Not added to `tags`. |`map(string)`|`{}`| no |
23
-
| allowed\_ports | List of allowed ingress TCP ports |`list(number)`|`[]`| no |
24
-
| allowed\_ports\_udp | List of allowed ingress UDP ports |`list(number)`|`[]`| no |
25
23
| ami | The AMI to use for the instance. By default it is the AMI provided by Amazon with Ubuntu 16.04 |`string`|`""`| no |
26
24
| ami\_owner | Owner of the given AMI (ignored if `ami` unset) |`string`|`""`| no |
27
25
| applying\_period | The period in seconds over which the specified statistic is applied |`number`|`60`| no |
@@ -69,6 +67,7 @@
69
67
| root\_iops | Amount of provisioned IOPS. This must be set if root\_volume\_type is set to `io1`|`number`|`0`| no |
70
68
| root\_volume\_size | Size of the root volume in gigabytes |`number`|`10`| no |
71
69
| root\_volume\_type | Type of root volume. Can be standard, gp2 or io1 |`string`|`"gp2"`| no |
70
+
| security\_group\_rules | A list of maps of Security Group rules. <br>The values of map is fully complated with `aws_security_group_rule` resource. <br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`| <pre>[<br> {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br> ],<br> "from_port": 0,<br> "protocol": "-1",<br> "to_port": 65535,<br> "type": "egress"<br> }<br>]</pre> | no |
72
71
| security\_groups | List of Security Group IDs allowed to connect to the instance |`list(string)`|`[]`| no |
73
72
| source\_dest\_check | Controls if traffic is routed to the instance when the destination address does not match the instance. Used for NAT or VPNs |`bool`|`true`| no |
74
73
| ssh\_key\_pair | SSH key pair to be provisioned on the instance |`string`| n/a | yes |
0 commit comments