Maintaining and Securing EC2 Instances
For instructions on tasks such as starting, stopping, rebooting, and deleting EC2 instances; monitoring EC2 instance usage; deleting security groups or rules, and changing elastic IP address associations, click Help in the AWS Management Console and search the Documentation.
Secure EC2 instances as you secure other security-critical resources in your organization. For example:
![*](bullet.gif)
Keep up to date on security patches for OS and third-party applications.
![*](bullet.gif)
Use the OS firewall in addition to other security mechanisms.
![*](bullet.gif)
Take appropriate backups.
![*](bullet.gif)
Protect data stored in the virtualized environment.
![*](bullet.gif)
Follow best practices for applications, including:
![*](bullet.gif)
Change all default passwords.
![*](bullet.gif)
Use encryption on network connections as appropriate.
![*](bullet.gif)
Enable and review security audit.
Responsibility for security is shared by AWS and you. For the AWS security statement, go to
http://aws.amazon.com/security.