Allowing a firewall to have all ports open increases the attack surface and makes your resources more vulnerable to potential security breaches.
Limit access to only necessary ports and protocols and restrict access to trusted sources to reduce the risk of unauthorized access.