top of page
SEC 9. How are you protecting the integrity of the operating system on your Amazon EC2 instances?
Another traditional control is to protect the integrity of the operating system. This is easily done in EC2 using traditional host-based techniques (e.g., OSSEC, Tripwire, Trend Micro Deep Security, etc.).
Best practices:
ï‚· File integrity controls are used for EC2 instances.
ï‚· Host-based intrusion detection controls are used for EC2 instances.
ï‚· Use of a solution from the AWS Marketplace or an APN Partner.
ï‚· Use of a custom AMI or configuration management tools (i.e., Puppet or Chef) that is secured by default.
bottom of page