A company wants to remove all SSH keys permanently from a specific subset of its Amazon Linux 2 Amazon EC2 instances that are using the same IAM instance profile. However, three individuals who have IAM user accounts will need to access these instances by using an SSH session to perform critical duties.
How can a security engineer provide the access to meet these requirements?
Pat9595
2 months, 3 weeks agodiv05jkjl
6 months, 1 week ago