diff --git a/terraform/main.tf b/terraform/main.tf
index ff1b8bff8dc487f3914aa177b8ff13e57b4eb0b6..a4fdf2e1f61d4f8ed0026923629e5eff18fce7a2 100644
--- a/terraform/main.tf
+++ b/terraform/main.tf
@@ -67,11 +67,7 @@ resource "openstack_networking_port_v2" "net1" {
   network_id     = openstack_networking_network_v2.net1.id
   admin_state_up = true
   security_group_ids = [
-  openstack_compute_secgroup_v2.icmp.id,
-  openstack_compute_secgroup_v2.http.id,
-  openstack_compute_secgroup_v2.https.id,
-  openstack_compute_secgroup_v2.ssh.id,
-  
+  openstack_compute_secgroup_v2.nginx.id,
   ]
   fixed_ip {
     subnet_id = openstack_networking_subnet_v2.net1_subnet.id
@@ -105,42 +101,27 @@ resource "openstack_compute_keypair_v2" "user1" {
 
 # CREATING SECURITY_GROUP
   
-resource "openstack_compute_secgroup_v2" "icmp" {
-  name        = "icmp"
-  description  = "Security group rule for port -1"
+resource "openstack_compute_secgroup_v2" "nginx" {
+  name        = "nginx"
+  description  = "Security group rule for port 80"
   rule {
     from_port   = -1
     to_port     = -1
     ip_protocol = "icmp"
     cidr        = "0.0.0.0/0"
   }
-}
- 
-resource "openstack_compute_secgroup_v2" "http" {
-  name        = "http"
-  description  = "Security group rule for port 80"
   rule {
     from_port   = 80
     to_port     = 80
     ip_protocol = "tcp"
     cidr        = "0.0.0.0/0"
   }
-}
- 
-resource "openstack_compute_secgroup_v2" "https" {
-  name        = "https"
-  description  = "Security group rule for port 443"
   rule {
     from_port   = 443
     to_port     = 443
     ip_protocol = "tcp"
     cidr        = "0.0.0.0/0"
   }
-}
- 
-resource "openstack_compute_secgroup_v2" "ssh" {
-  name        = "ssh"
-  description  = "Security group rule for port 22"
   rule {
     from_port   = 22
     to_port     = 22