1.

Name The Practices Available When It Comes To Securing The Amazon Ec2?

Answer»

This can be done through several practices. Review of the PROTOCOLS in security group is to be monitored regularly and it is to be ensured that the principle of least is applicable over there. Next practice is using access MANAGEMENT and AWS identity for controlling and securing the access. Access is to be restricted to hosts and networks that are trusted. In addition to this, only those permissions are opened which are REQUIRED and not any other. It would also be good to disable password based LOGINS for the instances.

This can be done through several practices. Review of the protocols in security group is to be monitored regularly and it is to be ensured that the principle of least is applicable over there. Next practice is using access management and AWS identity for controlling and securing the access. Access is to be restricted to hosts and networks that are trusted. In addition to this, only those permissions are opened which are required and not any other. It would also be good to disable password based logins for the instances.



Discussion

No Comment Found