docs.aws.amazon.com Open in urlscan Pro
18.66.147.42  Public Scan

Submitted URL: https://aws.amazon.com/answers/security/aws-securing-windows-instances
Effective URL: https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/ec2-security.html
Submission: On January 18 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

WÄHLEN SIE IHRE COOKIE-EINSTELLUNGEN AUS

Wir verwenden wichtige Cookies und ähnliche Tools, die für die Bereitstellung
unserer Website und Dienste erforderlich sind. Wir verwenden
Performance-Cookies, um anonyme Statistiken zu sammeln, damit wir verstehen, wie
Kunden unsere Website nutzen, und Verbesserungen vornehmen können. Essentielle
Cookies können nicht deaktiviert werden, aber Sie können auf „Cookies anpassen“
klicken, um Performance-Cookies abzulehnen.

Wenn Sie zustimmen, verwenden AWS und zugelassene Dritte ebenfalls Cookies, um
nützliche Website-Funktionen bereitzustellen, Ihre Präferenzen zu speichern und
relevante Inhalte, einschließlich relevanter Werbung, anzuzeigen. Um
fortzufahren, ohne diese Cookies zu akzeptieren, klicken Sie auf „Weiter ohne zu
akzeptieren“. Um detailliertere Entscheidungen zu treffen oder mehr zu erfahren,
klicken Sie auf „Cookies anpassen“.

Alle Cookies akzeptierenOhne Akzeptieren fortfahrenAnpassen von Cookies


COOKIE-EINSTELLUNGEN ANPASSEN

Wir verwenden Cookies und ähnliche Tools (zusammen "Cookies") für folgende
Zwecke.


ESSENZIELL

Diese Cookies sind erforderlich, um unsere Website und Services bereitzustellen
und können nicht deaktiviert werden. Sie werden in der Regel als Reaktion auf
Ihre Aktionen auf der Website festgelegt, z. B. die Festlegung Ihrer
Datenschutzeinstellungen, die Anmeldung oder das Ausfüllen von Formularen.




LEISTUNG

Leistungs-Cookies stellen anonyme Statistiken darüber bereit, wie Kunden auf
unserer Website navigieren, damit wir die Website-Erfahrung und -Leistung
verbessern können. Zugelassene Dritte können Analysen in unserem Namen
durchführen, die Daten aber nicht für ihre eigenen Zwecke verwenden.

Lesitungs-Cookies zulassen
Erlaubt


FUNKTIONAL

Funktionale Cookies helfen uns dabei, nützliche Website-Funktionen
bereitzustellen, Ihre Präferenzen zu speichern und relevante Inhalte anzuzeigen.
Zugelassene Dritte können diese Cookies so einrichten, dass bestimmte
Website-Funktionen bereitgestellt werden. Wenn Sie diese Cookies nicht zulassen,
funktionieren einige oder alle dieser Services möglicherweise nicht
ordnungsgemäß.

Funktionale Cookies zulassen
Erlaubt


WERBUNG

Diese Cookies können von uns oder unseren Werbepartnern über unsere Website
gesetzt werden und uns helfen, relevante Marketinginhalte bereitzustellen. Wenn
Sie diese Cookies nicht zulassen, werden Sie weniger relevante Werbung erleben.

Werbe-Cookies zulassen
Erlaubt

Das Blockieren einiger Arten von Cookies kann sich auf Ihre Erfahrung auf
unseren Websites auswirken. Sie können Ihre Cookie-Einstellungen jederzeit
ändern, indem Sie in der Fußzeile dieser Website auf Cookie-Einstellungen
klicken. Um mehr darüber zu erfahren, wie wir und zugelassene Dritte Cookies auf
unseren Websites verwenden, lesen Sie bitte unseren AWS-Cookie-Hinweis.

AbbrechenEinstellungen speichern




COOKIE-EINSTELLUNGEN KONNTEN NICHT GESPEICHERT WERDEN

Wir speichern derzeit nur wichtige Cookies, da wir Ihre Cookie-Einstellungen
nicht speichern konnten.

Wenn Sie Ihre Cookie-Einstellungen ändern möchten, versuchen Sie es später
erneut über den Link in der Fußzeile der AWS-Konsole oder wenden Sie sich an den
Support, wenn das Problem weiterhin besteht.

Verwerfen


Kontakt
Deutsch


AWS-Konto erstellen
 1. AWS
 2. ...
    
    
 3. Documentation
 4. Amazon EC2
 5. User Guide for Windows Instances

Feedback
Präferenzen


AMAZON ELASTIC COMPUTE CLOUD


USER GUIDE FOR WINDOWS INSTANCES

 * What is Amazon EC2?
 * Set up
 * Get started tutorial
 * Best practices
 * Working with AWS SDKs
 * Console-to-Code
 * Amazon Machine Images
    * Boot modes
       * Launch an instance
       * AMI boot mode parameter
       * Instance type boot mode
       * Instance boot mode
       * Operating system boot mode
       * UEFI variables
       * UEFI Secure Boot
          * How UEFI Secure Boot works
          * Launch an instance with UEFI Secure Boot support
          * Verify whether an instance is enabled for UEFI Secure Boot
   
    * AWS Windows AMIs
       * Windows fast launch
          * Prerequisites
          * Configure Windows fast launch settings
          * View Windows fast launch AMIs
          * Manage resource costs
          * Monitor Windows fast launch
          * Service-linked role
      
       * Managed AWS Windows AMIs
       * Specialized Windows AMIs
          * SQL Server AMIs
          * STIG Hardened AMIs
      
       * AWS Windows AMI version history
   
    * Find a Windows AMI
    * Shared AMIs
       * Find shared AMIs
       * Make an AMI public
       * Share an AMI with organizations or OUs
       * Share an AMI with specific AWS accounts
       * Cancel having an AMI shared with your account
       * Use bookmarks
       * Best practices for shared Windows AMIs
   
    * Paid AMIs
    * AMI lifecycle
       * Create a custom Windows AMI
       * Modify an AMI
       * Copy an AMI
       * Store and restore an AMI
       * Deprecate an AMI
       * Disable an AMI
       * Archive AMI snapshots
       * Deregister your AMI
       * Recover AMIs from the Recycle Bin
       * Automate the EBS-backed AMI lifecycle
   
    * Use encryption with EBS-backed AMIs
    * Monitor AMI events
    * Understand AMI billing
       * AMI billing fields
       * Find AMI billing information
       * Verify AMI charges on your bill
   
    * AMI quotas

 * Instances
    * Windows instances
    * Instance types
       * General purpose
          * Burstable performance instances
             * Key concepts
             * Unlimited mode
                * Concepts
                * Examples
            
             * Standard mode
                * Concepts
                * Examples
            
             * Work with burstable performance instances
             * Monitor your CPU credits
      
       * Compute optimized
       * Memory optimized
       * Storage optimized
       * Accelerated computing
          * Install NVIDIA drivers
          * Install AMD drivers
          * Activate NVIDIA GRID Virtual Applications
          * Optimize GPU settings
      
       * High-performance computing
       * Find an instance type
       * Get recommendations
          * For new workloads
          * For existing workloads
      
       * Change the instance type
          * Compatibility
          * Troubleshoot
   
    * Instance purchasing options
       * On-Demand Instances
       * Reserved Instances
          * Regional and zonal Reserved Instances (scope)
          * Types of Reserved Instances (offering classes)
          * How Reserved Instances are applied
          * Use your Reserved Instances
          * How you are billed
          * Buy Reserved Instances
          * Sell in the Reserved Instance Marketplace
          * Modify Reserved Instances
          * Exchange Convertible Reserved Instances
          * Reserved Instance quotas
      
       * Spot Instances
          * Best practices
          * How Spot Instances work
          * Spot Instance pricing history
          * Savings
          * Work with Spot Instances
             * Example launch specifications
         
          * Spot request status
          * Rebalance recommendations
          * Spot Instance interruptions
             * Reasons for interruption
             * Interruption behavior
             * Stop
             * Hibernate
             * Terminate
             * Prepare for interruptions
             * Initiate an interruption
             * Spot Instance interruption notices
             * Find interrupted Spot Instances
             * Determine whether Amazon EC2 terminated a Spot Instance
             * Billing
         
          * Spot placement score
          * Spot Instance data feed
          * Spot Instance quotas
          * Burstable performance instances
      
       * Dedicated Hosts
          * Pricing and billing
          * Burstable T3 instances on Dedicated Hosts
          * Work with Dedicated Hosts
          * Work with shared Dedicated Hosts
          * Dedicated Hosts on AWS Outposts
          * Host recovery
          * Host maintenance
          * Track configuration changes
      
       * Dedicated Instances
          * Work with Dedicated Instances
      
       * Capacity Reservations
          * On-Demand Capacity Reservations
             * Capacity Reservation pricing and billing
             * Work with Capacity Reservations
             * Work with Capacity Reservation groups
             * Capacity Reservations in cluster placement groups
             * Capacity Reservations in Local Zones
             * Capacity Reservations in Wavelength Zones
             * Capacity Reservations on AWS Outposts
             * Work with shared Capacity Reservations
             * Capacity Reservation Fleets
                * Capacity Reservation Fleet concepts
                * Work with Capacity Reservation Fleets
                * Example configurations
                * Using service-linked roles
            
             * Monitoring Capacity Reservations
                * CloudWatch metrics
                * EventBridge events
                * Utilization notifications
         
          * Capacity Blocks for ML
             * Capacity Blocks pricing and billing
             * Work with Capacity Blocks
             * Monitor Capacity Blocks
   
    * Instance lifecycle
       * Launch
          * Launch using the launch instance wizard
             * Old launch instance wizard
         
          * Launch using a launch template
             * Restrictions
             * Permissions
             * Control launching instances
             * Create
             * Modify (manage versions)
             * Delete
             * Launch instances
         
          * Launch an instance from an existing instance
          * Use an AWS Marketplace instance
      
       * Stop and start
       * Hibernate
          * Overview
          * Prerequisites
          * Limitations
          * Enable hibernation for an instance
          * Hibernate an instance
          * Start a hibernated instance
          * Troubleshoot
      
       * Reboot
       * Retire
       * Terminate
          * Considerations
          * Terminate an instance
      
       * Recover
   
    * Connect
       * Connect to your instance
       * Connect to instances without requiring a public IPv4 address
          * Prerequisites
          * Permissions
          * Security groups
          * Create an EC2 Instance Connect Endpoint
          * Connect to an instance
          * Log connections
          * Remove EC2 Instance Connect Endpoint
          * Service-linked role
          * Quotas
      
       * Connect your instance to a resource
          * Tutorial: Connect an EC2 instance to an RDS database
             * Option 1: Automatically connect – EC2 console
                * Task 1: Create an RDS database – optional
                * Task 2: Launch an EC2 instance – optional
                * Task 3: Automatically connect your EC2 instance to your RDS
                  database
                * Task 4: Verify the connection configuration
            
             * Option 2: Automatically connect – RDS console
                * Task 1: Launch an EC2 instance – optional
                * Task 2: Create an RDS database and automatically connect it to
                  your EC2 instance
                * Task 3: Verify the connection configuration
            
             * Option 3: Manually connect (create security groups)
                * Task 1: Launch an EC2 instance – optional
                * Task 2: Create an RDS database – optional
                * Task 3: Manually connect your EC2 instance to your RDS
                  database
            
             * Clean up
   
    * Configure instances
       * EC2Launch v2
          * Overview
          * Install
          * Migrate
          * Manage
          * Subscribe
          * Settings
          * Troubleshoot
          * Version histories
      
       * EC2Launch
          * Install EC2Launch
          * Version history
      
       * EC2Config service
          * Install EC2Config
          * Version history
          * Troubleshoot
      
       * PV drivers
          * Upgrade PV drivers
          * Troubleshoot PV drivers
      
       * AWS NVMe drivers
       * Optimize CPU options
          * Rules for specifying CPU options
          * CPU cores and threads per CPU core per instance type
          * Specify CPU options for your instance
          * View the CPU options for your instance
      
       * Set the time
       * Set the password
       * Add Windows components
       * Configure a secondary private IPv4 Address
       * Run commands at launch
       * Instance metadata and user data
          * Use IMDSv2
             * How IMDSv2 works
             * Transition to using IMDSv2
             * Supported SDKs
         
          * Configure the instance metadata options
             * For new instances
             * For existing instances
         
          * Retrieve instance metadata
          * Work with instance user data
          * Retrieve dynamic data
          * Instance metadata categories
          * Instance identity documents
             * Verify using the PKCS7 signature
             * Verify using the base64-encoded signature
             * Verify using the RSA-2048 signature
             * AWS public certificates
         
          * Instance identity roles
      
       * SQL Server Clustering in EC2
       * Install WSL
   
    * Upgrade Windows instances
       * Perform an in-place upgrade
       * Perform an automated upgrade
       * Migrate to latest generation instance types
          * Migrate to Xen from Nitro
      
       * Migrate Microsoft SQL Server from Windows to Linux
          * Setting up
          * Get started
      
       * Troubleshoot an upgrade
   
    * Identify instances
    * Set up a Windows HPC cluster

 * Fleets
    * EC2 Fleet
       * EC2 Fleet request types
          * EC2 Fleet 'instant' type
      
       * EC2 Fleet configuration strategies
          * Plan an EC2 Fleet
          * Allocation strategies for Spot Instances
          * Attribute-based instance type selection
          * On-Demand backup
          * Capacity Rebalancing
          * Maximum price overrides
          * Control spending
          * Instance weighting
      
       * Work with EC2 Fleets
   
    * Spot Fleet
       * Spot Fleet request types
       * Spot Fleet configuration strategies
          * Plan a Spot Fleet request
          * Allocation strategies for Spot Instances
          * Attribute-based instance type selection
          * On-Demand in Spot Fleet
          * Capacity Rebalancing
          * Spot price overrides
          * Control spending
          * Instance weighting
      
       * Work with Spot Fleets
       * CloudWatch metrics for Spot Fleet
       * Automatic scaling for Spot Fleet
          * Target tracking scaling policies
          * Step scaling policies
          * Scheduled scaling
   
    * Monitor fleet events
       * EC2 Fleet event types
       * Spot Fleet event types
       * Create EventBridge rules
          * For EC2 Fleet events
          * For Spot Fleet events
   
    * Tutorials
       * Tutorial: Use EC2 Fleet with instance weighting
       * Tutorial: Use EC2 Fleet with On-Demand as the primary capacity
       * Tutorial: Launch On-Demand Instances using targeted Capacity
         Reservations
       * Tutorial: Launch instances into Capacity Blocks
       * Tutorial: Use Spot Fleet with instance weighting
   
    * Example configurations
       * EC2 Fleet example configurations
       * Spot Fleet example configurations
   
    * Fleet quotas

 * Elastic Graphics
    * Work with Elastic Graphics
    * Elastic Graphics maintenance
    * Use CloudWatch metrics to monitor Elastic Graphics
    * Troubleshoot

 * Monitor
    * Automated and manual monitoring
    * Best practices for monitoring
    * Monitor the status of your instances
       * Instance status checks
       * State change events
       * Scheduled events
          * Define event windows for scheduled events
   
    * Monitor your instances using CloudWatch
       * Enable detailed monitoring
       * List available metrics
       * Get statistics for metrics
          * Get statistics for a specific instance
          * Aggregate statistics across instances
          * Aggregate statistics by Auto Scaling group
          * Aggregate statistics by AMI
      
       * Graph metrics
       * Create an alarm
       * Create alarms that stop, terminate, reboot, or recover an instance
   
    * Automate using EventBridge
    * Log API calls with AWS CloudTrail
    * Monitor your .NET and SQL Server applications

 * Networking
    * Regions and Zones
    * Instance IP addressing
       * Multiple IP addresses
   
    * Instance hostname types
    * Bring your own IP addresses
    * Elastic IP addresses
    * Network interfaces
       * Best practices for configuring network interfaces
       * Scenarios for network interfaces
       * Requester-managed network interfaces
       * Assign prefixes
          * Work with prefixes
   
    * Network bandwidth
    * Enhanced networking
       * Elastic Network Adapter (ENA)
       * ENA Express
       * Intel 82599 VF
       * Operating system optimizations
       * Network performance metrics
       * Troubleshoot ENA Windows driver
   
    * Instance topology
       * How it works
       * Prerequisites
       * Permissions
       * Limitations
       * Examples
   
    * Placement groups
       * Work with placement groups
       * Share a placement group
       * Placement groups on AWS Outposts
   
    * Network MTU
    * Virtual private clouds
    * Ports and Protocols

 * Code examples
    * Actions
       * Add tags to resources
       * Allocate an Elastic IP address
       * Associate an Elastic IP address with an instance
       * Create a Amazon Virtual Private Cloud (Amazon VPC)
       * Create a launch template
       * Create a route table
       * Create a security group
       * Create a security key pair
       * Create a subnet
       * Create and run an instance
       * Delete a launch template
       * Delete a security group
       * Delete a security key pair
       * Delete a snapshot
       * Describe Availability Zones
       * Describe Regions
       * Describe instance status
       * Describe instances
       * Describe snapshots
       * Disable detailed monitoring
       * Disassociate an Elastic IP address from an instance
       * Enable monitoring
       * Get data about Amazon Machine Images
       * Get data about a security group
       * Get data about instance types
       * Get data about the instance profile associated with an instance
       * Get details about Elastic IP addresses
       * Get the default VPC
       * Get the default subnets for a VPC
       * List security key pairs
       * Reboot an instance
       * Release an Elastic IP address
       * Replace the instance profile associated with an instance
       * Set inbound rules for a security group
       * Start an instance
       * Stop an instance
       * Terminate an instance
   
    * Scenarios
       * Build and manage a resilient service
       * Get started with instances

 * Security
    * Infrastructure security
    * Resilience
    * Data protection
    * Windows VBS
       * Credential Guard
   
    * Identity and access management
       * IAM policies
          * Policy structure
          * Tag resources during creation
          * Control access to EC2 resources using resource tags
          * Example policies for CLI or SDK
          * Example policies for the console
      
       * AWS managed policies
       * IAM roles
       * Network access
   
    * Key pairs
       * Create key pairs
       * Tag a public key
       * Describe public keys
       * Delete a public key
       * Verify the fingerprint
   
    * Security groups
       * Security group rules
       * Connection tracking
       * Default and custom security groups
       * Work with security groups
       * Security group rules for different use cases
   
    * AWS PrivateLink
    * Configuration management
    * Update management
    * Change management
    * Compliance validation
    * Audit and accountability
    * NitroTPM
       * Considerations
       * Prerequisites
       * Verify whether an AMI is enabled for NitroTPM
       * Enable or stop using NitroTPM on an instance

 * Storage
    * Amazon EBS
       * EBS volumes
          * EBS volume types
             * General Purpose SSD volumes
             * Provisioned IOPS SSD volumes
             * Throughput Optimized HDD and Cold HDD volumes
         
          * Size and configuration constraints
          * Create a volume
          * Attach a volume to an instance
          * Attach a volume to multiple instances
             * NVMe reservations
         
          * Make a volume available for use
          * View volume details
          * Replace a volume
          * Replace a root volume
          * Monitor the status of your volumes
          * Detach a volume from an instance
          * Delete a volume
          * Fault testing
      
       * EBS snapshots
          * Create snapshots
          * Delete a snapshot
          * Lock a snapshot
             * Concepts
             * Considerations
             * IAM permissions
             * Work with snapshot lock
             * Monitoring snapshot locks
                * Monitoring snapshot locks using AWS CloudTrail
                * Monitoring snapshot locks using Amazon EventBridge
         
          * Copy a snapshot
          * Archive snapshots
             * Guidelines and best practices for archiving snapshots
             * Required IAM permissions
             * Work with snapshot archiving
             * Monitor snapshot archiving
         
          * View snapshot information
          * Share a snapshot
          * Block public access for snapshots
             * Considerations
             * IAM permissions
             * Enable block public access for snapshots
             * Monitor events
         
          * Recover snapshots from the Recycle Bin
          * Local snapshots on Outposts
          * Amazon EBS direct APIs
             * IAM permissions for EBS direct APIs
             * Use EBS direct APIs
                * Read snapshots
                * Write snapshots
                * Use encryption
                * Use Signature Version 4 signing
                * Use checksums
                * Idempotency for StartSnapshot API
                * Error retries
                * Optimize performance
                * EBS direct APIs service endpoints
            
             * Interface VPC endpoints
             * Log API calls with AWS CloudTrail
             * Frequently asked questions
         
          * Automate the snapshot lifecycle
      
       * VSS-based snapshots
          * What is AWS VSS?
          * Prerequisites
             * System requirements
             * IAM permissions
             * VSS components
                * Install manually
                * Update on a schedule
         
          * Create VSS snapshots
             * Use AWS Systems Manager
             * Use AWS Backup
             * Use Amazon Data Lifecycle Manager
         
          * Troubleshooting
          * Restore volumes from VSS snapshots
          * Version history
      
       * Amazon Data Lifecycle Manager
          * How Amazon Data Lifecycle Manager works
          * Default policies vs custom policies
          * Default policies
             * Default policy for EBS snapshots
             * Default policy for EBS-backed AMIs
         
          * Custom policies
             * Automate snapshot lifecycles
                * Requirements for using pre and post scripts
                * Automating application-consistent snapshots
                * Other use cases for pre and post scripts
                * How pre and post scripts work
                * Identifying snapshots created with pre and post scripts
                * Monitoring pre and post script execution
            
             * Automate AMI lifecycles
             * Automate cross-account snapshot copies
         
          * View, modify, and delete lifecycle policies
          * AWS Identity and Access Management
             * AWS managed policies
             * IAM service roles
             * Permissions for users
             * Permissions for encryption
         
          * Monitor the lifecycle of snapshots and AMIs
             * Monitor your policies using CloudWatch Events
             * Monitor your policies using Amazon CloudWatch
         
          * Troubleshooting
      
       * EBS data services
          * Elastic volumes
             * Requirements
             * Request volume modifications
             * Monitor modifications
             * Extend a file system
         
          * EBS encryption
          * Fast snapshot restore
      
       * EBS volumes and NVMe
       * EBS optimization
       * EBS performance
          * I/O characteristics and monitoring
          * Initialize volumes
          * RAID configuration
          * Benchmark EBS volumes
      
       * EBS CloudWatch metrics
       * EBS EventBridge events
       * EBS quotas
   
    * Instance store
       * Instance store volumes
       * Add instance store volumes
       * SSD instance store volumes
   
    * File storage
       * Amazon S3
       * Amazon EFS
       * Amazon FSx
   
    * Instance volume limits
    * Root device volume
    * Device names
    * Block device mappings
    * Map disks to volumes

 * Resources and tags
    * Recycle Bin
       * Considerations
       * Required IAM permissions
          * Condition keys for Recycle Bin
      
       * Work with retention rules
       * Work with resources in the Recycle Bin
       * Monitor Recycle Bin
          * Monitor using EventBridge
          * Monitor using CloudTrail
   
    * Resource locations
    * Resource IDs
    * List and filter your resources
    * Global View
    * Tag your resources
    * Service quotas
    * Usage reports

 * Troubleshoot
    * Common issues
    * Common messages
    * Troubleshoot launch issues
    * Connect to your instance
    * Troubleshoot an unreachable instance
    * Reset a lost or expired Windows administrator password
       * Reset using EC2Launch v2
       * Reset Using EC2Config
       * Reset using EC2Launch
   
    * Stop your instance
    * Terminate your instance
    * Troubleshoot Sysprep
    * EC2Rescue for Windows Server
       * Use the GUI
       * Use the command line
       * Use Systems Manager
   
    * EC2 Serial Console
       * Prerequisites
       * Configure access to the EC2 Serial Console
       * Connect to the EC2 Serial Console
       * Disconnect from the EC2 Serial Console
       * Troubleshoot your instance using the EC2 Serial Console
          * Use SAC to troubleshoot your Windows instance
   
    * Send a diagnostic interrupt

 * AWS Systems Manager for Microsoft System Center VMM
    * Set up
    * Manage EC2 Instances
    * Import Your VM
    * Troubleshoot

 * AWS Management Pack
    * Download
    * Deploy
       * Step 1: Install the AWS Management Pack
       * Step 2: Configure the watcher node
       * Step 3: Create an AWS Run As account
       * Step 4: Run the Add Monitoring wizard
       * Step 5: Configure ports and endpoints
   
    * Use
    * Upgrade
    * Uninstall
    * Troubleshoot

 * Related information
 * Document history

Security in Amazon EC2 - Amazon Elastic Compute Cloud
AWSDocumentationAmazon EC2User Guide for Windows Instances
Diese Seite wurde nicht in Ihre Sprache übersetzt. Übersetzung anfragen



SECURITY IN AMAZON EC2

PDFRSS

Cloud security at AWS is the highest priority. As an AWS customer, you benefit
from a data center and network architecture that are built to meet the
requirements of the most security-sensitive organizations.

Security is a shared responsibility between AWS and you. The shared
responsibility model describes this as security of the cloud and security in the
cloud:

 * Security of the cloud – AWS is responsible for protecting the infrastructure
   that runs AWS services in the AWS Cloud. AWS also provides you with services
   that you can use securely. Third-party auditors regularly test and verify the
   effectiveness of our security as part of the AWS Compliance Programs. To
   learn about the compliance programs that apply to Amazon EC2, see AWS
   Services in Scope by Compliance Program.

 * Security in the cloud – Your responsibility includes the following areas:
   
    * Controlling network access to your instances, for example, through
      configuring your VPC and security groups. For more information, see
      Controlling network traffic.
   
    * Managing the credentials used to connect to your instances.
   
    * Managing the guest operating system and software deployed to the guest
      operating system, including updates and security patches. For more
      information, see Update management in Amazon EC2.
   
    * Configuring the IAM roles that are attached to the instance and the
      permissions associated with those roles. For more information, see IAM
      roles for Amazon EC2.

This documentation helps you understand how to apply the shared responsibility
model when using Amazon EC2. It shows you how to configure Amazon EC2 to meet
your security and compliance objectives. You also learn how to use other AWS
services that help you to monitor and secure your Amazon EC2 resources.

For security best practices for Amazon EC2 running Windows Server, see Security
and Network under Best practices for Windows on Amazon EC2.

CONTENTS

 * Infrastructure security in Amazon EC2
 * Resilience in Amazon EC2
 * Data protection in Amazon EC2
 * Windows virtualization-based security features
 * Identity and access management for Amazon EC2
 * Amazon EC2 key pairs and Windows instances
 * Amazon EC2 security groups for Windows instances
 * Access Amazon EC2 using an interface VPC endpoint
 * Configuration management in Amazon EC2
 * Update management in Amazon EC2
 * Change management in Amazon EC2
 * Compliance validation for Amazon EC2
 * Audit and accountability in Amazon EC2
 * NitroTPM

Javascript is disabled or is unavailable in your browser.

To use the Amazon Web Services Documentation, Javascript must be enabled. Please
refer to your browser's Help pages for instructions.

Document Conventions
Get started with instances
Infrastructure security
Did this page help you? - Yes

Thanks for letting us know we're doing a good job!

If you've got a moment, please tell us what we did right so we can do more of
it.



Did this page help you? - No

Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.





HAT IHNEN DIESE SEITE GEHOLFEN?

Ja
Nein
Feedback geben

NÄCHSTES THEMA:

Infrastructure security

VORHERIGES THEMA:

Get started with instances

BRAUCHEN SIE HILFE?

 * Versuchen Sie es mit AWS re:Post 
 * Einen AWS IQ-Experten kontaktieren 

DatenschutzNutzungsbedingungen für die WebsiteCookie-Einstellungen
© 2024, Amazon Web Services, Inc. oder Tochtergesellschaften. Alle Rechte
vorbehalten.


AUF DIESER SEITE










DID THIS PAGE HELP YOU? - NO



Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.




Feedback