A company's security engineer is designing an isolation procedure for Amazon EC2 instances as part of an incident response plan. The security engineer needs to isolate a target instance to block any traffic to and from the target instance, except for traffic from the company's forensics team. Each of the company's EC2 instances has its own dedicated security group. The EC2 instances are deployed in subnets of a VPC. A subnet can contain multiple instances.
The security engineer is testing the procedure for EC2 isolation and opens an SSH session to the target instance. The procedure starts to simulate access to the target instance by an attacker. The security engineer removes the existing security group rules and adds security group rules to give the forensics team access to the target instance on port 22.
After these changes, the security engineer notices that the SSH connection is still active and usable. When the security engineer runs a ping command to the public IP address of the target instance, the ping command is blocked.
What should the security engineer do to isolate the target instance?
AgboolaKun
Highly Voted 1 year, 5 months agomaneeshsharma
Most Recent 4 days, 10 hours agoKaps443
2 weeks, 2 days agofcbflo
2 months agoAWSLoverLoverLoverLoverLover
2 months, 1 week agoFlyingHawk
2 months, 3 weeks agoFlyingHawk
2 months, 3 weeks agoWardove
3 months, 1 week agoTareDHakim
3 months, 1 week agoIPLogic
4 months, 3 weeks agoIPLogic
4 months, 4 weeks agoIPLogic
5 months agomzeynalli
5 months, 3 weeks agourbanmonk
4 months, 1 week agojakie22332
5 months, 3 weeks agoJohnyw
6 months, 2 weeks agoJust_Ninja
7 months, 2 weeks agojamesf
7 months, 4 weeks agoFunkyFresco
8 months, 1 week ago