Reviewing Amazon EC2 best practices
How you use and configure EC2 is going to depend on your use case. But some general EC2 best practices will ensure the security, reliability, durability, and availability of your applications and data. Let's delve into the recommended practices on how to handle security, storage, backup management, and so on.
Security
Like with almost any AWS service, it's possible to manage the access and security of your EC2 instances, taking advantage of identity federation, policies, and IAM. You can create credential management policies and procedures to create, rotate, distribute, and revoke AWS access credentials.
Like with any other service, you should assign the least privilege possible to all your users and roles. As they say in the military, your users should be on a need-to-know basis.
One advantage or disadvantage of using EC2 directly is that you are fully in charge of managing the operating system changes. For that reason, make...