Isolating your EC2 AMI using Security Groups
If you are a member of a development team that will be sharing code and data residing on shared storage in the cloud, you should create your own security group to isolate your VM and testing from others in your group. I learnt this the hard way when our development team was operating in the same security group and I accidentally terminated Harvey’s VM while he was rewriting the makefile. He lost all his changes.
- Access the Security Groups tab in ElasticFox.
- Create a new group and add new group permissions. I added a new group called pauls-sandbox and added group permissions for
- SSH (port 22),
- HTTP (port 80),
- HTTPS (port 443) and
- ICMP (port -1) for pings