If an active Security Group Rule allows an SSH connection to one of the instances and that connection is compromised, you may use NACL, or the Network Access Control List, to interrupt it. In this blog, I will explain What NACLs are and how to use them to stop security