The post AWS EC2 – Proceed without Key Pair appeared first on AWS Security Architect.
]]>sshd
in your AMI is configured to use password based authenticationThe post AWS EC2 – Proceed without Key Pair appeared first on AWS Security Architect.
]]>The post AWS Backups using SSM doc and bash appeared first on AWS Security Architect.
]]>
python ec2_volume_snapshot.py <volume_id> <region_name>
Sample python program to call aws backup service and perform a backup
import subprocess
import sys
import boto3
def execute_shell_commands(commands):
MyOut = subprocess.Popen(commands,
stdout=subprocess.PIPE,
stderr=subprocess.STDOUT)
stdout,stderr = MyOut.communicate()
#for command in commands:
command_string = ” “.join(commands)
print(“Command executed : %s” % command_string)
if stdout is not None:
stdout = stdout.decode(“utf-8”)
print(“Stdout :\n%s” % stdout)
if stderr is not None:
stderr = stderr.decode(“utf-8”)
print(“Stderr :\n%s” % stderr)
# Run pre-script
execute_shell_commands([‘sudo’, ‘service’, ‘apache2’, ‘stop’])
volume_id = sys.argv[1]
region_name = sys.argv[2]
ec2 = boto3.resource(‘ec2’, region_name=region_name)
volume = ec2.Volume(volume_id)
snapshot = volume.create_snapshot()
snapshot.wait_until_completed()
ec2_client = boto3.client(‘ec2’, region_name=region_name)
snapshot_details = ec2_client.describe_snapshots(SnapshotIds=[snapshot.id])
print(“Snapshot details :\n%s” % snapshot_details)
# Run post-script
execute_shell_commands([‘sudo’, ‘service’, ‘apache2’, ‘start’])
execute_shell_commands([‘sudo’, ‘service’, ‘apache2’, ‘status’])
Sample bash script (in SSM doc) to call a python command
#!/bin/bash
MYSTRING="Do something in bash"
echo $MYSTRING
python - << EOF
myPyString = "Do something on python"
print myPyString
EOF
echo "Back to bash"
The post AWS Backups using SSM doc and bash appeared first on AWS Security Architect.
]]>The post AWS SSM Connect for no ingress EC2 instances appeared first on AWS Security Architect.
]]>This is a brief post on how to connect to a completely cut off EC2 instance – which is in a private subnet and also has a no ingress Security Group attached.
Attach the SSM Managed Policy to the EC2 instance
Launch and Test the Instance
aws ssm start-session --target <<windows-ec2-instanceid>> --document-name AWS-StartPortForwardingSession --parameters '{"portNumber":["3389"],"localPortNumber":["<<desiredPortNumber>>"]}' --region <<region-where-ec2-launched>>
Testing it out Telnet to Port(3640 in this example) telnet localhost 3690
Summary
No Ingress EC2 instances are a great way to protect access to your instances on AWS. For an advanced security consultation, please Contact AWS Security Architect
The post AWS SSM Connect for no ingress EC2 instances appeared first on AWS Security Architect.
]]>The post Protecting EC2 instances on AWS – Basic EC2 Security appeared first on AWS Security Architect.
]]>Here are a couple of simple, yet often ignored, best practices around EC2 instance access.
EC2 Instances that need to be public facing should be front ended with a Load Balancer. A load balancer should expose the public IP, instead of the EC2.
IaaS based Compute is the most used service alongside Storage. Protecting Management Level access as well as public access is key to these instances is key to ensuring a secure AWS environment.
For an advanced security consultation, please Contact AWS Security Architect
The post Protecting EC2 instances on AWS – Basic EC2 Security appeared first on AWS Security Architect.
]]>