A company wants to prevent SSH access through the use of SSH key pairs for any Amazon Linux 2 Amazon EC2 instances in its AWS account. However, a system administrator occasionally will need to access these EC2 instances through SSH in an emergency. For auditing purposes, the company needs to record any commands that a user runs in an EC2 instance.
What should a security engineer do to configure access to these EC2 instances to meet these requirements?
luisfsm_111
Highly Voted 2 years, 8 months agoAdamWest
2 years, 7 months agoToptip
Most Recent 2 years, 1 month agoITGURU51
2 years, 2 months agoKarthikRaveRaam
2 years, 6 months agosecdaddy
2 years, 6 months agotainh
2 years, 7 months agolandsamboni
2 years, 7 months agoD2
2 years, 7 months agoAdamWest
2 years, 7 months agoIsaias
2 years, 7 months agoAdamWest
2 years, 8 months ago