1 Answer
- Newest
- Most votes
- Most comments
1
Here are some suggestions to address the concerns raised in the question:
- To monitor services and log file deletions on EC2 Windows instances, you can configure the CloudWatch Logs agent to collect and send logs to CloudWatch Logs. This will provide visibility without needing administrator access on instances.
- Use IAM roles with least privilege access instead of shared administrator credentials. Attach appropriate policies to allow specific actions without full administrator access.
- Tag your EC2 instances with relevant metadata like environment, application etc. This will help track and filter instances for retirement or other managenent tasks.
- Leverage AWS Config to monitor configuration changes and track configuration history. Configure notifications and remediation actions for non-compliant configurations.
- Implement security best practices like regular vulnerability scans, patching, log monitoring etc. as part of the development and deployment process.
- Integrate security checks and compliance validation as part of code reviews, testing and deployment pipelines. Address issues before code is deployed to production.
- Use AWS security services like Secrets Manager, IAM roles, SSO etc. to manage credentials and access securely. Monitor access patterns and anomalies using AWS Security Hub.
Relevant content
- asked 7 months ago
- asked 3 months ago
- AWS OFFICIALUpdated 10 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago