Mailing the story:
Secure Server Deployments in Hostile Territory, Part II
In my last article, I started a series on some of the challenges related to spawning
secure servers on Amazon EC2. In that column, I discussed some of the overall
challenges EC2 presents for security compared to a traditional infrastructure
and elaborated on how I configure security groups and manage secrets.