Skip to content

Latest commit

 

History

History
26 lines (13 loc) · 705 Bytes

File metadata and controls

26 lines (13 loc) · 705 Bytes

Securing Cloud Instance

These are recommendations for securing Cloud instances and deployments

AWS

Limit access

Use IAM roles and policies to limit what users and services can access on instance

{% embed url="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-policies-for-amazon-ec2.html" %}

Use SSM for SSH connections

{% embed url="https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-getting-started-enable-ssh-connections.html" %}

EC2 best practices

{% embed url="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-best-practices.html" %}

GCP

Best practices

{% embed url="https://cloud.google.com/security/best-practices" %}