Consider a scenario where a customer has provided you with an access to a AWS console and needs you to recover a running EC2 linux instance for him. Let’s assume that the customer is not very tech savy and not in possession of any private keys to the instance.
You got two options at this point in gaining access to the instance and working on restoring the system.
Continue reading