network-security-groups▌
aj-geddes/useful-ai-prompts · updated Apr 8, 2026
Implement network security groups and firewall rules to enforce least privilege access, segment networks, and protect infrastructure from unauthorized access.
Network Security Groups
Table of Contents
Overview
Implement network security groups and firewall rules to enforce least privilege access, segment networks, and protect infrastructure from unauthorized access.
When to Use
- Inbound traffic control
- Outbound traffic filtering
- Network segmentation
- Zero-trust networking
- DDoS mitigation
- Database access restriction
- VPN access control
- Multi-tier application security
Quick Start
Minimal working example:
# aws-security-groups.yaml
Resources:
# VPC Security Group
VPCSecurityGroup:
Type: AWS::EC2::SecurityGroup
Properties:
GroupDescription: VPC security group
VpcId: vpc-12345678
SecurityGroupIngress:
# Allow HTTP from anywhere
- IpProtocol: tcp
FromPort: 80
ToPort: 80
CidrIp: 0.0.0.0/0
Description: "HTTP from anywhere"
# Allow HTTPS from anywhere
- IpProtocol: tcp
FromPort: 443
ToPort: 443
CidrIp: 0.0.0.0/0
Description: "HTTPS from anywhere"
# Allow SSH from admin network only
- IpProtocol: tcp
// ... (see reference guides for full implementation)
Reference Guides
Detailed implementations in the references/ directory:
| Guide | Contents |
|---|---|
| AWS Security Groups | AWS Security Groups |
| Kubernetes Network Policies | Kubernetes Network Policies |
| GCP Firewall Rules | GCP Firewall Rules |
| Security Group Management Script | Security Group Management Script |
Best Practices
✅ DO
- Implement least privilege access
- Use security groups for segmentation
- Document rule purposes
- Regularly audit rules
- Separate inbound and outbound rules
- Use security group references
- Monitor rule changes
- Test access before enabling
❌ DON'T
- Allow 0.0.0.0/0 for databases
- Open all ports unnecessarily
- Mix environments in single SG
- Ignore egress rules
- Allow all protocols
- Forget to document rules
- Use single catch-all rule
- Deploy without firewall
Discussion
Product Hunt–style comments (not star reviews)- No comments yet — start the thread.
Ratings
4.7★★★★★31 reviews- ★★★★★Kabir Jackson· Dec 16, 2024
I recommend network-security-groups for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.
- ★★★★★Chaitanya Patil· Dec 4, 2024
Useful defaults in network-security-groups — fewer surprises than typical one-off scripts, and it plays nicely with `npx skills` flows.
- ★★★★★Piyush G· Nov 23, 2024
network-security-groups has been reliable in day-to-day use. Documentation quality is above average for community skills.
- ★★★★★Jin Khanna· Nov 23, 2024
Registry listing for network-security-groups matched our evaluation — installs cleanly and behaves as described in the markdown.
- ★★★★★Neel Sharma· Nov 7, 2024
Solid pick for teams standardizing on skills: network-security-groups is focused, and the summary matches what you get after install.
- ★★★★★Rahul Santra· Nov 3, 2024
Registry listing for network-security-groups matched our evaluation — installs cleanly and behaves as described in the markdown.
- ★★★★★Neel Johnson· Oct 26, 2024
network-security-groups has been reliable in day-to-day use. Documentation quality is above average for community skills.
- ★★★★★Pratham Ware· Oct 22, 2024
network-security-groups reduced setup friction for our internal harness; good balance of opinion and flexibility.
- ★★★★★Shikha Mishra· Oct 14, 2024
Solid pick for teams standardizing on skills: network-security-groups is focused, and the summary matches what you get after install.
- ★★★★★Jin Tandon· Oct 14, 2024
network-security-groups reduced setup friction for our internal harness; good balance of opinion and flexibility.
showing 1-10 of 31