Security Groups
    Cloud compute security groups are virtual firewalls that control inbound and outbound traffic to and from compute resources, such as virtual machines, within a cloud environment.
    Key Aspects of Cloud Compute Security Groups:
    
        - Inbound Traffic Rules: Define rules to allow or deny incoming traffic based on protocols, ports, and sources.
 
        - Outbound Traffic Rules: Control outbound communication from compute resources.
 
        - Stateful Filtering: Automatically allow response traffic for allowed inbound traffic.
 
        - Port-Based Filtering: Specify allowed ports for communication.
 
        - Protocol Filtering: Control traffic based on communication protocols (e.g., TCP, UDP).
 
        - IP Address Whitelisting and Blacklisting: Permit or block traffic from specific IP addresses or ranges.
 
        - Application-Specific Rules: Customize rules for specific applications or services.
 
        - Tiered Security: Implement multiple security groups with varying levels of access.
 
        - Dynamic Rule Updates: Modify security group rules as needed without disrupting resources.
 
        - Role-Based Access: Assign security groups based on user roles or responsibilities.
 
        - Logging and Monitoring: Monitor security group activity and violations.
 
        - Zero Trust Networking: Default to deny all traffic and explicitly allow required traffic.
 
        - Integration with IAM: Associate security groups with specific users or roles.
 
        - Compliance: Ensure security groups align with regulatory and security requirements.