You can modify the port, protocol, and IP address of your security group rules as required to ensure the security of your instances.
Before modifying a security group rule, assess its impact to avoid network disruptions or security risks.
Do not directly modify security group rules for running services. Before you modify a security group rule that is in use, you can clone the security group and modify the rule in the test environment to ensure that the modified rule works. For details, see Cloning a Security Group.
Security group rules are like a whitelist. If there are no rules that allow or deny specific traffic, the security group denies all traffic to or from the instances in it.
in the upper left corner and choose Network > Virtual Private Cloud.The Virtual Private Cloud page is displayed.
The security group list is displayed.
The security group details page is displayed.
The security group rule list is displayed.