Hop
Search…
Securing Cloud Instance
These are recommendations for securing Cloud instances and deployments

AWS

Limit access

Use IAM roles and policies to limit what users and services can access on instance
IAM policies for Amazon EC2 - Amazon Elastic Compute Cloud
Amazon Elastic Compute Cloud

Use SSM for SSH connections

Step 8: (Optional) Enabling and controlling permissions for SSH connections through Session Manager - AWS Systems Manager
AWS Systems Manager

EC2 best practices

Best practices for Amazon EC2 - Amazon Elastic Compute Cloud
Amazon Elastic Compute Cloud

GCP

Best practices

Cloud Security Best Practices Center  |  Google Cloud
Google Cloud
Copy link
Contents
AWS
GCP