A Developer's laptop was stolen. The laptop was not encrypted, and it contained the SSH key used to access multiple Amazon EC2 instances. A Security
Engineer has verified that the key has not been used, and has blocked port 22 to all EC2 instances while developing a response plan.
How can the Security Engineer further protect currently running instances?
DP15
Highly Voted 3 years, 7 months agoBillyC
3 years, 7 months agoBach999
3 years, 6 months agomadcloud
Highly Voted 2 years, 6 months agoMikeDuB
2 years, 4 months agohabros
Most Recent 4 months, 1 week agoliuyomz
1 year, 8 months agodiego1984
1 year, 10 months agoManikandan997
2 years, 11 months agoCollinsWolf
3 years, 1 month agoAppsec977
2 years, 10 months agoRadhaghosh
3 years, 3 months agosanjaym
3 years, 5 months agoNANDY666
3 years, 6 months agomvsnogueira
3 years, 6 months agodevjava
3 years, 6 months agoAfricanCloudGuru
3 years, 6 months agoAfricanCloudGuru
3 years, 6 months agoIvandrago
3 years, 6 months agoRaySmith
3 years, 6 months agoZhongkai
3 years, 6 months agoMoid
3 years, 6 months agoSHoKMaSTeR
3 years, 6 months ago