Security Groups
Security groups can be used to control access to resources
and data and to manage network traffic:
Control access
Security groups can grant users access to
applications, actions, and data. For example, in Active Directory, you can
assign user rights to security groups (RBAC) to determine what group members can do.
Manage network traffic
Security groups can be used to control the traffic that can
reach and leave resources. For example, in AWS, you can create security groups
with inbound and outbound rules to control traffic to and from an EC2 instance.
Protect against threats
Security groups can be used to protect against threats like
credential theft, fraud, and brand impersonation.
Here are some examples of how security groups can be used:
Google Admin console
To make a group a security group, you can add the Security label to it in the Google
Admin console.
Azure application security groups
You can group virtual machines and define network security
policies based on those groups.
AWS security groups
You can create security groups with inbound and outbound
rules to control traffic to and from an EC2 instance (Virtual Machine).
No comments:
Post a Comment