I wanted to ask about connecting EC2 to RDP in AWS.
I have added my EC2 Security Group (that contains the EC2 instances) into the Default RDP Group and Data is flowi
Interested to know more on this as well. In practice I have never noticed "other traffic" getting to the RDS instance. Always assumed it was just the DB port that was allowed through to the RDS instance. Seems a little odd to allow other traffic through, in my opinion.
Overall, I think it is just the originating security group that is allowed through - it doesn't inherit the rules from the security group you allow.
I think it is the same as adding ingress from another security group, in that it allows traffic originating from that security group through, but not traffic that just happens to match one of the rules in the security group. (Its different than if you assign a security group to an instance on boot in that all traffic that matches will be allowed: not traffic originating from said security group assigned on bootup).
Note: Security groups are easy to get confused with, so I hope this helps
You do not need to worry about additional ports being opened up on RDS server.
The EC2 security groups are just treated like an access control list when used in RDS DB security policies.
Basically what you are saying is that you want to let any instances which belong to specific EC2 security group have access to the RDS instances using that DB security groups policy.
The specific rules defined in the EC2 security groups do not matter.
This behavior basically just gives you a convenient way to easily allow access from a cluster of servers with some common association (their security group).