Elastic Compute Cloud (or in short EC2) is an infrastructure-as-a-service offering and one of the widely adopted services in the AWS platform.
EC2 allows businesses to rent units or computer power, storage, and keep track of companies’ entire network infrastructure.
Using EC2 allows developers to run virtual machines and gives the IT and DevOps teams the capacity to run cloud workload on AWS data centers. Developers can easily choose the desired scale and instance capacity, run multiple instances in parallel, autoscale and define policies in one interface.
EC2 has transformed the way teams work and empowered them through extensive control and flexibility over various aspects of their infrastructure. But with great power comes great responsibility.
Alongside the many benefits, the adoption of EC2 created new security risks for organizations as well as increased their external attack surface as each EC2 instance is a potential entry point into sensitive environments.
Today, any DevOps engineer with the right credit card number, can easily setup and configure the server. Any unintentional misconfiguration in the EC2 during the setup process can lead to a critical exposure which is likely to go unnoticed. But not by attackers. They can easily find such exposures while scanning the web.
According to 2020 Verizon’s breach report, human errors represent the third most common reason for breaches, and misconfiguration is the most common error type.
In April 2020, Natura cosmetics, one of the largest online retailers in Brazil, left two unprotected Amazon servers which contained over 272 gigabytes of data. According to the reports, approximately 250K of Natura’s customers were affected in one way or the other, and their personal information was stolen.
The key takeaway from this case and other similar cases is that EC2 users need a way to identify and manage every external-facing service which is hosted on their EC2 accounts and gain a clear understanding of the associated risks in real-time.
Discovering and eliminating unintentional exposures, unpatched vulnerabilities and other risks in your EC2 account must be automated, continuous and simple. This is exactly what led us to integrate Reposify with AWS EC2.
How does it work?
With this latest integration our users can review their full EC2 Network Interfaces inventory within Reposify’s platform and gain a 360 degree view of their network interface IPs hosted on EC2.
This integration delivers 2 way visibility:
From the inside-out: Reposify collects various parameters from your AWS EC2 accounts such as public IP, private IP, Instance status,Instance ID, MAC address, Lifecycle and Platform name.
From the outside-in: Reposify will automatically identify exposures, misconfigurations and security issues for all the IP addresses and provide additional insights relating to the version, service, certificate, banner, and more.
Put Reposify’s real-time exposure and risks discovery capabilities to work for your EC2 accounts.
See What Your Attack Surface Looks Like Right Now