Securing Cloud Instance

These are recommendations for securing Cloud instances and deployments

AWS

Limit access

Use IAM roles and policies to limit what users and services can access on instance

Use SSM for SSH connections

EC2 best practices

GCP

Best practices

Last updated