Skip to content

Commit

Permalink
Docs: Add explanation for running on AWS EC2 instances
Browse files Browse the repository at this point in the history
  • Loading branch information
ilija-lazoroski committed Aug 6, 2024
1 parent f06da2a commit ab38708
Show file tree
Hide file tree
Showing 2 changed files with 31 additions and 0 deletions.
31 changes: 31 additions & 0 deletions docs/content/features/run_on_aws.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
---
title: "Run on AWS EC2 Instances"
draft: false
description: "Run Infection Monkey on AWS EC2 instances"
tags: ["aws", "ec2", "run"]
pre: "<i class='fa-brands fa-aws'></i> "
---

## Description

The Infection Monkey can run on AWS EC2 instances using the
[AWS Systems Manager (SSM) Agent](
https://docs.aws.amazon.com/systems-manager/latest/userguide/what-is-systems-manager.html).
Each EC2 instance has an [SSM Agent](
https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent.html)
installed for updating, managing, and configuring the instance.
It executes requests received from the AWS Systems Manager, and uses the Amazon
Message Delivery Service to report back status and execution details.

This feature lets you run Infection Monkey Agent on your chosen EC2
instances without the requirement of manual installation, enabling the simulation of
various attack scenarios across your AWS infrastructure.

EC2 instances must be configured with the SSM Agent and the necessary IAM roles
to allow Infection Monkey to execute commands. The Monkey Island will
automatically detect running AWS instances and offer the option to deploy the
Monkey Agent on them.

![Running a Monkey on EC2 Instance](
/images/island/integrations/aws/run_on_aws_ec2.png "Running a Monkey on EC2
Instance")
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit ab38708

Please sign in to comment.