avatarTeri Radichel

Summarize

Stories About AWS EC2 Instances

Blog posts about AWS EC2 instances: Windows, Ubuntu, Linux

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics | Code.

🔒 Related Stories: AWS Security | Secure Code

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

When you deploy an EC2 instance it’s a good idea to get the latest AMI. this method gets the latest Amazon Linux 2 AMI. It needs to be tested and possibly reworked for Amazon Linux 2023 and any future updates but the concept is the same.

I’ve been using a container to run deployment jobs that require MFA on each execution. These jobs can use a role on an EC2 instance to obtain the necessary credentials and a code from a user in a production environment, rather than allowing automation to run without any user interaction whatsoever.

Exploring the use of Ubuntu on AWS.

Various mechanisms exist for authenticating to an EC2 isntance.

If you’re using a Chromebook this post explains how to SSH to an EC2 instance at the time it was written.

This post presents a script to deploy a user-specific EC2 instance unsing CloudFormation.

You’ll probably want the user-specific networking that goes with it.

Here I’m considering developer machines as a gateway to AWS services.

Follow for updates.

Teri Radichel | © 2nd Sight Lab 2023

About Teri Radichel:
~~~~~~~~~~~~~~~~~~~~
⭐️ Author: Cybersecurity Books
⭐️ Presentations: Presentations by Teri Radichel
⭐️ Recognition: SANS Award, AWS Security Hero, IANS Faculty
⭐️ Certifications: SANS ~ GSE 240
⭐️ Education: BA Business, Master of Software Engineering, Master of Infosec
⭐️ Company: Penetration Tests, Assessments, Phone Consulting ~ 2nd Sight Lab
Need Help With Cybersecurity, Cloud, or Application Security?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
🔒 Request a penetration test or security assessment
🔒 Schedule a consulting call
🔒 Cybersecurity Speaker for Presentation
Follow for more stories like this:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
❤️ Sign Up my Medium Email List
❤️ Twitter: @teriradichel
❤️ LinkedIn: https://www.linkedin.com/in/teriradichel
❤️ Mastodon: @teriradichel@infosec.exchange
❤️ Facebook: 2nd Sight Lab
❤️ YouTube: @2ndsightlab
Ec2
AWS
Security
Cloud
Virtual Machine
Recommended from ReadMedium