This post focuses on methods used to leverage and capture information while targeting EC2 compute resources. We'll cover EC2 and associated AWS service dependencies responsible for maintaining clean security hygiene when leveraging compute on Amazon Web Services. EC2 is also responsible for running the underlying compute for EKS