This is Part 5 of a multi-part series of posts on how we securely ran ThreatSim
in AWS for 5 years and never lost a customer (that we know of) due to any cloud
security concerns.
There are tons of resources for all kinds of host security. In this post,