Which combination of steps meets these requirements?
(Choose two.)
Create a database server security group with inbound and outbound rules for MySQL port 3306 traffic to and from anywhere (0 0.0.0/0).
Create a database server security group with an inbound rule for MySQL port 3306 and specify the source as a web server security group.
Create a web server security group with an inbound allow rule for HTTPS port 443 traffic from anywhere (0.0.0.0/0) and an inbound deny rule for IP range 182.20.0.0/16.
Create a web server security group with an inbound rule for HTTPS port 443 traffic from anywhere (0.0.0.0/0). Create network ACL inbound and outbound deny rules for IP range 182.20.0.0/16.
Create a web server security group with inbound and outbound rules for HTTPS port 443 traffic to and from anywhere (0.0.0.0/0). Create a network ACL inbound deny rule for IP range 182.20.0.0/16.
Explanations:
Allowing inbound and outbound MySQL traffic (port 3306) from anywhere (0.0.0.0/0) is insecure and violates the requirement that the database should only be accessible to the web layer.
Creating a database security group with an inbound rule for MySQL port 3306 and specifying the source as the web server security group ensures that only the web servers can access the database, meeting the security requirement.
While it correctly specifies HTTPS traffic, allowing inbound traffic for HTTPS from anywhere (0.0.0.0/0) does not restrict it to SSL connections only, and the deny rule for IP range 182.20.0.0/16 is unnecessary as security groups do not support deny rules.
Creating an inbound rule for HTTPS port 443 traffic from anywhere (0.0.0.0/0) is correct, and using network ACLs to deny traffic from the IP range 182.20.0.0/16 effectively blocks that range, complying with all requirements.
While it allows HTTPS traffic, creating inbound and outbound rules for port 443 to/from anywhere (0.0.0.0/0) does not enforce the SSL connection requirement properly. Network ACLs cannot override security group rules, and there’s no need for outbound deny rules.