CloudWiki
Rules
Description

It's important to note that when an EC2 instance is in a stopped state, AWS continues to bill for certain attached resources such as EBS volumes and Elastic IPs. Therefore, it is advisable to terminate either the stopped instances or their attached resources if they are no longer in use.

Remediation

To remediate the presence of EC2 instances in a stopped state, you can follow these steps:

  1. Log in to the AWS Management Console and navigate to the EC2 service.
  2. Click on the "Instances" link in the left-hand menu.
  3. Identify any instances that are in a stopped state.
  4. If the stopped instances are no longer required, select the instance(s) and click on the "Actions" button, then select "Instance State" and "Terminate" from the dropdown menu.
  5. In the "Terminate Instances" dialog box, confirm that you want to terminate the instance(s).
  6. Click on the "Terminate" button to remove the instance(s) from your account.

It's important to note that before terminating any instances, you should ensure that they are no longer required for your application or business needs. Additionally, you should also verify that there are no attached resources such as EBS volumes or Elastic IPs that are still in use before terminating the instance.

By regularly checking for and terminating stopped instances that are no longer required, you can help reduce unnecessary costs on your AWS bill.

Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.