As you bring more workloads on to AWS, you sometimes need to serve private content without publicly exposing services on the internet. For example, internal portals for employees typically need to be accessible only via a private network. A common solution is setting up a remote-access virtual private network VPN , which enables users to directly connect their mobile device or laptop to a private network where corporate resources are hosted. Those features include a simplified administration web interface and automated certificate management to easily issue user certificates and keys without necessarily requiring an existing public key infrastructure PKI. After the free trial expires, it automatically converts to a paid hourly subscription on your AWS bill.
Create an internet-facing endpoint for your server
Launching OpenVPN Access Server from AWS Marketplace
Using Amazon EC2 eliminates your need to invest in hardware up front, so you can develop and deploy applications faster. You can use Amazon EC2 to launch as many or as few virtual servers as you need, configure security and networking, and manage storage. Amazon EC2 enables you to scale up or down to handle changes in requirements or spikes in popularity, reducing your need to forecast traffic. For more information about cloud computing, see What is cloud computing? Preconfigured templates for your instances, known as Amazon Machine Images AMIs , that package the bits you need for your server including the operating system and additional software. Various configurations of CPU, memory, storage, and networking capacity for your instances, known as instance types. Secure login information for your instances using key pairs AWS stores the public key, and you store the private key in a secure place.
How to get started with Amazon EC2
A web server faces the outside world. WSGI is a Python standard. At the end, our complete stack of components will look like this:.
Cloud security at AWS is the highest priority. As an AWS customer, you benefit from a data center and network architecture that are built to meet the requirements of the most security-sensitive organizations. Security is a shared responsibility between AWS and you. The shared responsibility model describes this as security of the cloud and security in the cloud:. AWS also provides you with services that you can use securely. Third-party auditors regularly test and verify the effectiveness of our security as part of the AWS Compliance Programs. Security in the cloud — Your responsibility includes the following areas:. Controlling network access to your instances, for example, through configuring your VPC and security groups.