スキップしてコンテンツを表示

Best practice for storing EC2 SSH keys, SQL Server encryption keys (SMK, DMK), other encryption keys

0

Hi all, I'm looking for best practices on where to store the SSH key that is created when a Linux EC2 instance is created. In our environment, we join our instances to a domain and protect them with a MFA solution, therefore, individual SSH key pairs are not required per user. However, this still leaves us with the initial SSH key pair that is generated when first creating the instance.

What options (if any) does AWS provide for storing these types of keys? I've Secrets Manager mentioned. I'm looking for any and all options available for the various types of keys.

Thanks!

2回答
2
承認された回答

Hello.

I think it would be a good idea to store the key pair in the Systems Manager Parameter Store and restrict who can access it using IAM policies, etc.
https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/create-key-pairs.html#create-key-pair-cloudformation

I recommend reading the FAQ document below for the differences between Secrets Manager and Parameter Store.
https://aws.amazon.com/systems-manager/faq/?nc1=h_ls#Parameter_Store

エキスパート
回答済み 2年前
エキスパート
レビュー済み 2年前
エキスパート
レビュー済み 2年前
0

You can launch a EC2 instance without associating a key pair.

I would suggest you enable AWS Systems Manager Session Manager and optionally EC2 Instance Connect in the event you need to access your Linux instance.

AWS
エキスパート
回答済み 2年前
  • Thanks, Mike. I will definitely keep this in mind for future deployments. I would prefer to use SSM as much as possible, anyhow. Thanks again!

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

関連するコンテンツ