These are recommendations for securing Cloud instances and deployments
Use IAM roles and policies to limit what users and services can access on instance
{% embed url="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-policies-for-amazon-ec2.html" %}
{% embed url="https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-getting-started-enable-ssh-connections.html" %}
{% embed url="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-best-practices.html" %}
{% embed url="https://cloud.google.com/security/best-practices" %}