Last updated 2 years ago
These are recommendations for securing Cloud instances and deployments
Use IAM roles and policies to limit what users and services can access on instance