Member-only story

Understanding and Securing EC2 instances

Gupta Bless
5 min readApr 11, 2021

--

Before moving forward towards EC2, lets get familiar with AWS Access keys and their security if you interested then go ahead and check my previous blog for that.

https://gupta-bless.medium.com/securing-and-managing-aws-access-key-88aa8ae938a

What is Amazon Elastic Compute Cloud/EC2?

EC2 is web based service provided by amazon that is used to provide resizable compute capacity in the cloud in short they are virtual machine in cloud.

Instance: Computing in EC2 is handled by launching it. Therefore, whenever we launch ec2 instance it depends on two factors:

· The operation system we are going to use in that, it will make the configuration which support that OS.

· Amount of virtual hardware user provides to that instance such as the RAM, Hard Disk or SSD.

If there are a lot of instance in your account then it is not easy to manage these instances so we can make that work easier by tagging them. Tag are basically key/value pairs which user can associate with instance.

Types:

There are variety of instance and it depends on memory, storage, network performance and virtual CPUs. So while selecting any instance we have to consider the organization requirement first and on that…

--

--

Gupta Bless
Gupta Bless

Written by Gupta Bless

Security enthusiast working to secure web for others.

No responses yet