Ssh On Aws? Check Out Session Manager Instead! | Still Using
Whenever a new developer joined the team, Alex had to manually add their public key to dozens of EC2 instances. When someone left, he had to scrub those keys like a digital crime scene. He constantly worried about port 22 being open to the world, and his audit logs were basically a series of shrug emojis.
She showed him her screen. With one click in the AWS Console—or a simple command in the terminal—she was inside an instance. No bastion hosts, no managing .pem files, and no open inbound ports.
One Tuesday, while Alex was elbow-deep in a messy authorized_keys file, his teammate Sarah leaned over. "Still using SSH? You should check out ." Alex was skeptical. "Does it involve more keys?" "Zero keys," Sarah said. Still using SSH on AWS? Check out Session Manager instead!
Sarah used IAM policies to decide exactly who could log in. No more manual key rotations.
Port 22 was closed. The instance didn't even need a public IP address; it just needed the SSM Agent and an outbound connection. Whenever a new developer joined the team, Alex
Once upon a time, there was a DevOps engineer named Alex. Alex spent half his life playing "SSH Key Tetris."
Alex realized he had been guarding a castle with a thousand tiny keys when he could have just used a biometric gate. He deleted his bastion host that afternoon, revoked the SSH keys, and finally went home on time. She showed him her screen
Every single command Sarah typed was being logged to CloudWatch and S3. If something went wrong, Alex wouldn't have to guess what happened—he could replay the entire session.
