2 Answers
- Newest
- Most votes
- Most comments
1
You don't need to define any inbound rules in the security group. The SSM agent initiates the communication with the service so you only need TCP port 443 open on the outbound as security groups are stateful. You can also use VPC Endpoints within the VPC to communicate with the SSM services. See: Step 4: Create VPC endpoints.
1
Adding inbound rules to the security group associated with the EC2 managed by Systems Manager is not necessary.
No additional inbound rules are required in the security group created for the EC2 instances in the private subnets.
answered a year ago
Thank you!
Relevant content
- asked a year ago
- asked a year ago
- AWS OFFICIALUpdated 8 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated a year ago
Thank you!