I believe the answer from Ron is correct, but does not answer your question.
If you have instances in multiple subnets and your instances need to communicate your NACLs need to account for this with allow rules. I haven't tested this, but I've worked with AWS a long time and I'm fairly sure this is the way it works.
Interestingly, security groups are a firewall that can be thought of as around each network interface. So if you want instances in a security group to communicate you need a rule to allow ingress from the security group to itself.
Answers to comments in questions:
Ports
You only need to open ports 80 / 443 on your web server security group. The 1024 - 65535 part is ephemeral ports, which you should read up on if you want to understand them. Start with Wikipedia but then move on to something easier to understand if you need to.
AWS Inspector
This page says the following
The Amazon Inspector agent initiates all communication with the Amazon
Inspector service. This means that the agent must have an outbound
network path to public endpoints so that it can send telemetry data.
For example, the agent might connect to
arsenal..amazonaws.com, or the endpoint might be an Amazon S3
bucket at s3.dualstack..amazonaws.com. Make sure to replace
with the actual AWS Region where you are running Amazon
Inspector. For more information, see AWS IP Address Ranges. Because
all connections from the agent are established outbound, it is not
necessary to open ports in your security groups to allow inbound
communications to the agent from Amazon Inspector.