Mailing the story:

Secure Server Deployments in Hostile Territory, Part II

In my last article, I started a series on some of the challenges related to spawning secure servers on Amazon EC2. In that column, I discussed some of the overall challenges EC2 presents for security compared to a traditional infrastructure and elaborated on how I configure security groups and manage secrets.
What is your name?

What is your E-Mail address?

What is the email address of the recipient?

Add a special note from yourself?