Skip to Content
Protecting Compute Instances
shortcut

Protecting Compute Instances

by Vishakha Sadhwani
October 2025
Advanced
5 pages
3m
English
O'Reilly Media, Inc.
Content preview from Protecting Compute Instances

Protect Compute Instances

What happens if an attacker gains access to your cloud-based compute instances? They could steal sensitive data, disrupt your operations, or even use your resources for malicious activities. Protecting these instances is vital for maintaining the security and integrity of your applications and data.

The Core Idea

Compute instances, the workhorses of your cloud infrastructure, can be vulnerable to various threats if not adequately secured. These include unauthorized access, malware, and denial-of-service attacks. Understanding these risks is the first step towards implementing effective protective measures.

How It Works

Securing compute instances involves a multilayered approach:

Access control

Secure your instances by limiting who has access to them. Utilize strong passwords, multifactor authentication, and the principle of least privilege to prevent unauthorized access.

Network security

Implement firewalls to control incoming and outgoing traffic and use virtual private networks (VPNs) to encrypt connections and protect data in transit.

Vulnerability management

Regularly scan your instances for vulnerabilities and apply security patches promptly to mitigate potential risks.

Data protection

Encrypt sensitive data stored on your instances to prevent unauthorized access, even if the instance is compromised.

Security monitoring

Monitor your instances for suspicious activity ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Classifying and Protecting Sensitive Data

Classifying and Protecting Sensitive Data

Vishakha Sadhwani

Publisher Resources

ISBN: 9781098177195