Maintaining and Securing EC2 Instances
For instructions on tasks such as starting, stopping, rebooting, and deleting EC2 instances; monitoring EC2 instance usage; deleting security groups or rules, and changing elastic IP address associations, click Help in the AWS Management Console and search the Documentation.
Secure EC2 instances as you secure other security-critical resources in your organization. For example:
Keep up to date on security patches for OS and third-party applications.
Use the OS firewall in addition to other security mechanisms.
Take appropriate backups.
Protect data stored in the virtualized environment.
Follow best practices for applications, including:
Change all default passwords.
Use encryption on network connections as appropriate.
Enable and review security audit.
Responsibility for security is shared by AWS and you. For the AWS security statement, go to
http://aws.amazon.com/security.