AWS SAA-C03 #37

A company recently launched a variety of new workloads on Amazon EC2 instances in its AWS account. The company needs to create a strategy to access and administer the instances remotely and securely. The company needs to implement a repeatable process that works with native AWS services and follows the AWS Well-Architected Framework.

Which solution will meet these requirements with the LEAST operational overhead?

A. Use the EC2 serial console to directly access the terminal interface of each instance for administration.

B. Attach the appropriate IAM role to each existing instance and new instance. Use AWS Systems Manager Session Manager to establish a remote SSH session.

C. Create an administrative SSH key pair. Load the public key into each EC2 instance. Deploy a bastion host in a public subnet to provide a tunnel for administration of each instance.

D. Establish an AWS Site-to-Site VPN connection. Instruct administrators to use their local on-premises machines to connect directly to the instances by using SSH keys across the VPN tunnel.


B. Attach the appropriate IAM role to each existing instance and new instance. Use AWS Systems Manager Session Manager to establish a remote SSH session.

Option B provides a secure and low-operational-overhead solution that aligns with the AWS Well-Architected Framework:

  1. IAM Roles: By attaching the appropriate IAM roles to the instances, you can control access to AWS services and resources. This ensures that only authorized users or systems can interact with the instances.

  2. AWS Systems Manager Session Manager: This service allows you to establish secure, controlled sessions with instances. It doesn't require opening inbound ports in security groups or network access control lists, which improves security.

  3. Least Operational Overhead: Using Systems Manager Session Manager means you don't have to manage additional infrastructure like bastion hosts or VPN connections. It's a managed service provided by AWS, reducing operational overhead.

  4. Secure: The use of IAM roles and Systems Manager for remote access is in line with security best practices, and it provides a controlled and secure method for administrators to access the instances.

Option A (using the EC2 serial console) might be useful in certain scenarios, but it's not suitable for remote administration on a regular basis due to limitations in functionality.

Option C (using a bastion host) adds additional infrastructure that needs to be managed and secured, which increases operational overhead.

Option D (AWS Site-to-Site VPN) is a valid option for connecting on-premises resources to AWS, but it introduces more complexity and overhead than necessary for this scenario, making it less suitable for the requirement of least operational overhead.

相关推荐
成都极云科技2 小时前
云平台托管,云计算资源租赁-企业高效信息化基础设施的关键
云计算
weixin_433261102 小时前
阿里云 ECS SSH 快速配置指南
阿里云·云计算·ssh
hdidiyun2 小时前
阿里云国际站新用户怎么充值?外币信用卡被拒怎么办?(2026最新教程)
阿里云·云计算
旭日跑马踏云飞2 小时前
【阿里云】扩容操作指南
服务器·阿里云·云计算
珠海西格3 小时前
工商业分布式光伏:西格防逆流方案如何适配高负荷波动场景?
大数据·服务器·分布式·云计算·能源
ComPDFKit3 小时前
在 AWS EC2 上部署 ComPDF:构建可扩展的文档处理服务
云计算·aws·办公提效
是垚不是土3 小时前
ClaudeCode×Elasticsearch:服务日志查询的 AI 化落地实践
大数据·运维·人工智能·elasticsearch·云计算·jenkins
IT 行者3 小时前
每天了解几个MCP SERVER:AWS KB Retrieval
云计算·aws
青藤云安全3 小时前
主机安全最佳实践|青藤万相 × AWS 护航汽车服务平台出海破局
安全·汽车·aws
sbjdhjd3 小时前
RHCE | Linux 例行性工作(定时任务)从入门到精通
linux·运维·服务器·华为·云计算