A company wants to prevent SSH access through the use of SSH key pairs for any Amazon Linux 2 Amazon EC2 instances in its AWS account. However, a system administrator occasionally will need to access these EC2 instances through SSH in an emergency. For auditing purposes, the company needs to record any commands that a user runs in an EC2 instance.
What should a security engineer do to configure access to these EC2 instances to meet these requirements?
luisfsm_111
Highly Voted 2 years, 5 months agoAdamWest
2 years, 5 months agoToptip
Most Recent 1 year, 11 months agoITGURU51
2 years agoKarthikRaveRaam
2 years, 4 months agosecdaddy
2 years, 4 months agotainh
2 years, 5 months agolandsamboni
2 years, 5 months agoD2
2 years, 5 months agoAdamWest
2 years, 5 months agoIsaias
2 years, 5 months agoAdamWest
2 years, 5 months ago