Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are some of the key best practices for security in amazon ec2?



What are some of the key best practices for security in amazon ec2?..

Answer / Omkar Shukla

Some key security best practices for Amazon EC2 include: 1) Using security groups to control inbound and outbound traffic, 2) Keeping operating systems and applications up-to-date with the latest patches, 3) Rotating access keys regularly, 4) Using IAM roles and policies to manage permissions, 5) Enabling enhanced network security features such as Security Groups with Egress rules, 6) Monitoring log files for suspicious activity, and 7) Implementing multi-factor authentication (MFA) where possible.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Amazon Web Services (AWS) Interview Questions

How is AWS Elastic Beanstalk different than AWS OpsWorks?

1 Answers  


How do I access the running db instance?

1 Answers  


Is amazon cloud free for prime ?

1 Answers  


Do iam role can resolve any security issues?

1 Answers  


How is a spot instance different from an on-demand instance or reserved instance?

1 Answers  


How many reserved instances am I able to purchase?

1 Answers  


A company needs to monitor the read and write IOPS for their AWS MySQL RDS instance and send real-time alerts to their operations team. Which AWS services can accomplish this?

1 Answers  


What is object level storage?

1 Answers  


What is s3? What is it used for? Should encryption be used?

1 Answers  


Explain the types of natting?

1 Answers  


What is an ami? How do I build one?

1 Answers  


Is aws bigger than azure?

1 Answers  


Categories