We create a Security Group for the Database instance. To ensure security, do not configure the application’s Security group together.
Practice security group configuration
Configure Inbound rules