Skip to content

SecurityGroupEgress ​

The SecurityGroupEgress resource allows you to manage outbound rules for AWS EC2 Security Groups. For more details, refer to the AWS EC2 SecurityGroupEgress documentation.

Minimal Example ​

Create a basic SecurityGroupEgress rule allowing outbound traffic to a specific CIDR block.

ts
import AWS from "alchemy/aws/control";

const egressRule = await AWS.EC2.SecurityGroupEgress("egressRule", {
  GroupId: "sg-123abc45", // ID of the security group
  IpProtocol: "tcp",
  FromPort: 80, // Allow outbound traffic on port 80
  ToPort: 80,
  CidrIp: "192.168.1.0/24" // Allow outbound traffic to this CIDR block
});

Advanced Configuration ​

Configure a SecurityGroupEgress rule to allow outbound traffic to another security group and specify a description.

ts
const advancedEgressRule = await AWS.EC2.SecurityGroupEgress("advancedEgressRule", {
  GroupId: "sg-123abc45",
  IpProtocol: "tcp",
  FromPort: 443, // Allow outbound traffic on port 443
  ToPort: 443,
  DestinationSecurityGroupId: "sg-678def90", // Allow traffic to another security group
  Description: "Allow outbound HTTPS traffic to internal service"
});

IPv6 Configuration ​

Create a SecurityGroupEgress rule specifically for IPv6 traffic.

ts
const ipv6EgressRule = await AWS.EC2.SecurityGroupEgress("ipv6EgressRule", {
  GroupId: "sg-123abc45",
  IpProtocol: "tcp",
  FromPort: 22, // Allow outbound SSH traffic
  ToPort: 22,
  CidrIpv6: "2001:0db8:85a3:0000:0000:8a2e:0370:7334/128", // Allow outbound traffic to this IPv6 address
  Description: "Allow outbound SSH to specific IPv6 address"
});

CIDR and Prefix List Example ​

Allow outgoing traffic to a specific CIDR and a prefix list.

ts
const cidrAndPrefixEgressRule = await AWS.EC2.SecurityGroupEgress("cidrAndPrefixEgressRule", {
  GroupId: "sg-123abc45",
  IpProtocol: "udp",
  FromPort: 53, // Allow DNS queries
  ToPort: 53,
  CidrIp: "10.0.0.0/16", // Allow outbound traffic to this CIDR block
  DestinationPrefixListId: "pl-abcde123", // Reference to a prefix list
  Description: "Allow DNS outbound traffic"
});