MEDIUM

Ensure EC2 instances are managed by AWS Systems Manager

EC2 instances should be managed by AWS Systems Manager for patching, inventory, compliance tracking, and remote access without SSH.

Security Impact

Unmanaged instances may miss security patches and cannot use Session Manager for secure access.

How to Remediate

Install the SSM Agent on instances and attach an IAM role with AmazonSSMManagedInstanceCore policy.

Affected Resources

AWS::EC2::InstanceAWS::SSM::ManagedInstance

Compliance Frameworks

SOC 2NIST 800-53CIS AWS v1.5.0

How TigerGate Helps

TigerGate continuously monitors your AWS environment to detect and alert on this misconfiguration. Here's what our platform does for this specific check:

  • Continuous Scanning

    Automatically scans all Elastic Compute Cloud (EC2) resources across your AWS accounts every hour

  • Instant Alerts

    Get notified via Slack, email, or webhooks when this misconfiguration is detected

  • One-Click Remediation

    Fix this issue directly from the TigerGate dashboard with our guided remediation

  • Compliance Evidence

    Automatically collect audit evidence for SOC 2, NIST 800-53, CIS AWS v1.5.0 compliance

  • Drift Detection

    Get alerted if this configuration drifts back to an insecure state after remediation

Check Details

Check ID
aws-ec2-13
Service
Elastic Compute Cloud (EC2)
Category
Instance Configuration
Severity
MEDIUM

Automate This Check

TigerGate automatically scans your AWS environment for this and 575+ other security checks.

Start Free Trial