Securing my EC2 instances

0

Hi, I am pretty new to AWS. I have full admin access to the console.
We have 4 ec2 instances (DB, Proxy, UI and API). These servers are responsible for the website we have hosted on them.

  1. How do I make them secure so that they are not prone to any attackers? Any best practices, documentation would be helpful.
  2. Currently, the DB guy has locked down SSH to only his static IP (on his local machine). He uses it when there is a need to update Database using scripts. Can there be a workaround for that as this is a bottle neck situation for us with full dependency on him.
질문됨 한 달 전377회 조회
1개 답변
1

Hi, I am trying not to be too techie on this. You can make use of a mesh of the following:

  1. Security Groups: Think of these as virtual firewalls. You'll create different groups for your database, proxy, UI, and API servers. These groups will determine who can access them and through which ports. For example, you might only allow access to your database from the proxy server on a specific port.

  2. Outbound Traffic Control: By default, block all outgoing network traffic and only allow the ones you explicitly need. This ensures that your servers don't communicate unexpectedly with the outside world.

  3. IAM (Identity and Access Management): This is like setting up user accounts and permissions. You'll create separate accounts for administrators and developers and give them access only to what they need to do their jobs.

  4. Encryption at Rest: Make sure your data is safe even when it's stored. Encrypt the volumes where your data resides to protect it from unauthorized access.

  5. Secure Remote Access: Access your EC2 instances securely without needing to open traditional ports like SSH. This tool ensures your sessions are encrypted and can support additional layers of authentication for added security.

  6. Web Application Firewall (WAF): If you have web applications, consider using a firewall to filter incoming traffic. This helps protect your applications from common online threats.

  7. Monitoring Access Logs: Keep an eye on who's trying to access your servers and take action if you detect any unauthorized attempts. This helps maintain the security of your system.

profile picture
전문가
답변함 한 달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠