2 Answers
- Newest
- Most votes
- Most comments
1
You don't need to define any inbound rules in the security group. The SSM agent initiates the communication with the service so you only need TCP port 443 open on the outbound as security groups are stateful. You can also use VPC Endpoints within the VPC to communicate with the SSM services. See: Step 4: Create VPC endpoints.
1
Adding inbound rules to the security group associated with the EC2 managed by Systems Manager is not necessary.
No additional inbound rules are required in the security group created for the EC2 instances in the private subnets.
answered 2 years ago
Thank you!
Relevant content
- asked 2 years ago
- asked 2 years ago
- asked 4 months ago
- asked 10 months ago
- AWS OFFICIALUpdated 8 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 7 months ago
- AWS OFFICIALUpdated 2 years ago
Thank you!