A Developer's laptop was stolen. The laptop was not encrypted, and it contained the SSH key used to access multiple Amazon EC2 instances. A Security
Engineer has verified that the key has not been used, and has blocked port 22 to all EC2 instances while developing a response plan.
How can the Security Engineer further protect currently running instances?
DP15
Highly Voted 3 years, 10 months agoBillyC
3 years, 10 months agoBach999
3 years, 10 months agomadcloud
Highly Voted 2 years, 10 months agoMikeDuB
2 years, 8 months agohabros
Most Recent 8 months agoliuyomz
2 years agodiego1984
2 years, 1 month agoManikandan997
3 years, 3 months agoCollinsWolf
3 years, 5 months agoAppsec977
3 years, 2 months agoRadhaghosh
3 years, 6 months agosanjaym
3 years, 9 months agoNANDY666
3 years, 9 months agomvsnogueira
3 years, 9 months agodevjava
3 years, 9 months agoAfricanCloudGuru
3 years, 9 months agoAfricanCloudGuru
3 years, 9 months agoIvandrago
3 years, 10 months agoRaySmith
3 years, 10 months agoZhongkai
3 years, 10 months agoMoid
3 years, 10 months agoSHoKMaSTeR
3 years, 10 months ago