Direkt zum Inhalt

Best practice for storing EC2 SSH keys, SQL Server encryption keys (SMK, DMK), other encryption keys

0

Hi all, I'm looking for best practices on where to store the SSH key that is created when a Linux EC2 instance is created. In our environment, we join our instances to a domain and protect them with a MFA solution, therefore, individual SSH key pairs are not required per user. However, this still leaves us with the initial SSH key pair that is generated when first creating the instance.

What options (if any) does AWS provide for storing these types of keys? I've Secrets Manager mentioned. I'm looking for any and all options available for the various types of keys.

Thanks!

2 Antworten
2
Akzeptierte Antwort

Hello.

I think it would be a good idea to store the key pair in the Systems Manager Parameter Store and restrict who can access it using IAM policies, etc.
https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/create-key-pairs.html#create-key-pair-cloudformation

I recommend reading the FAQ document below for the differences between Secrets Manager and Parameter Store.
https://aws.amazon.com/systems-manager/faq/?nc1=h_ls#Parameter_Store

EXPERTE
beantwortet vor 2 Jahren
EXPERTE
überprüft vor 2 Jahren
EXPERTE
überprüft vor 2 Jahren
0

You can launch a EC2 instance without associating a key pair.

I would suggest you enable AWS Systems Manager Session Manager and optionally EC2 Instance Connect in the event you need to access your Linux instance.

AWS
EXPERTE
beantwortet vor 2 Jahren
  • Thanks, Mike. I will definitely keep this in mind for future deployments. I would prefer to use SSM as much as possible, anyhow. Thanks again!

Du bist nicht angemeldet. Anmelden um eine Antwort zu veröffentlichen.

Eine gute Antwort beantwortet die Frage klar, gibt konstruktives Feedback und fördert die berufliche Weiterentwicklung des Fragenstellers.