Intermediate Security Groups

Allow connections by Security Groups

If you chose Security Group for the Remote option, you can choose an existing security group as the source for the new rule.

Instead of opening network traffic to a range of IP addresses, access can be granted to virtual machine instances that have a chosen security group assigned to them. This is particularly useful where you may have a group of instances and you may want to allow access between them all.