Curated articles, resources, tips and trends from the DevOps World.
Summary: This is a summary of an article originally published by the source. Read the full original article here →
Cloud security is top of mind right now, given the various high-profile security breaches today. One overlooked source of potential vulnerabilities is unused EC2 Key Pairs. EC2 Key Pairs are used to configure an EC2 instance with SSH access and provide a convenient way to manage instances.
We'll also create 3 lists - one for storing all key pairs, one for used key pairs, and one for unused key pairs.
Deleting unused key pairs is a good practice to ensure that no one is granted unauthorized access to your instances.
Made with pure grit © 2024 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com