Amazon Elastic Compute Cloud (EC2)
Amazon Elastic Compute Cloud (EC2) allows users to rent virtual computers to run their own computer applications. For ThreatConnect customers that leverage EC2 for the bulk of their cloud infrastructure, there’s potential exposure for malicious activity. Eventually, there will be a successful breach, and remediation must take place. The EC2 Playbook app allows you to perform various Incident Response actions on your EC2 infrastructure from ThreatConnect. The following actions are available:
- Describe Instances
- Create Tags
- Delete Tags
- Monitor Instances
- Unmonitor Instances
- Describe Snapshots
- Create Snapshot
- Assign Security Group
- Remove Security Group
- Add ACL
- Remove ACL
This app can be found in the ThreatConnect App Catalog under the name: Amazon Elastic Compute Cloud (EC2)
