AWS Elastic Compute Cloud (AWS EC2) was integrated by Mindflow to enable users to automate their incident management and better protect their information system.
AWS EC2 Overview
AWS EC2 is a scalable computing capacity in the AWS Cloud. With EC2, you don’t need to invest in hardware, so you can develop and deploy applications faster.
You can launch as many virtual servers as you need, configure security and networking, and manage storage. You can scale up or down to handle changes in requirements or spikes in popularity, reducing your need to forecast traffic.
In terms of security, AWS EC2 allows you to manage your security credentials to identify you to services in AWS and grant you unlimited use of your AWS resources. You can use Amazon EC2 and AWS Identity and Access Management (IAM) features to allow other users, services, and applications to use your Amazon EC2 resources without sharing your security credentials.
You can use IAM to control how others use resources in your AWS account, and you can use security groups to control access to your Amazon EC2 instances. You can choose to allow full use or limited use of your Amazon EC2 resources.
A security group acts as a virtual firewall for your EC2 instances. You can control incoming and outgoing traffic. When launching an instance, you can specify one or more security groups or rely on the default security group.
You can add rules to each security group that allows traffic to or from its associated instances. You can modify the rules for a security group at any time. New and modified rules are automatically applied to all instances that are associated with the security group.
When Amazon EC2 decides whether to allow traffic to reach an instance, it evaluates all of the rules from all the security groups associated with the instance.

Benefits
Create users and groups under your AWS account.
Assign unique security credentials to each user under your AWS account.
Control each user’s permissions to perform tasks using AWS resources.
Allow the users in another AWS account to share your AWS resources.
Create roles for your AWS account and define the users or services that can assume them.
Use existing identities for your enterprise to grant permissions to perform tasks using AWS resources.
Security group rules enable you to track and filter traffic based on protocols and port numbers. For example, an instance that’s configured as a web server needs security group rules that allow inbound HTTP and HTTPS access.
You can add and remove rules at any time. Your changes are automatically applied to the instances that are associated with the security group.