Securing Cloud Instance
These are recommendations for securing Cloud instances and deployments
AWS
Limit access
Use IAM roles and policies to limit what users and services can access on instance
Use SSM for SSH connections
EC2 best practices
GCP
Best practices
Last updated