You have a dozen engineers trying to SSH into EC2 instances while juggling credentials like it’s a Vegas act. Someone suggests “just use LastPass shared folders,” another mumbles “Systems Manager Session Manager is safer.” Both are right and wrong at the same time. The real trick is combining them smartly so credentials never leave a controlled boundary.
EC2 Systems Manager handles access by identity, not by key pair. It authenticates through IAM and records every session in CloudWatch. LastPass manages credentials, rotates them, and keeps secrets away from Slack threads and notebooks. When you integrate the two, you get a model where humans never see the keys they use. They just request access, and AWS plus LastPass handle the magic in the background.
Picture this workflow: a developer opens a Session Manager tab and selects an instance. Instead of digging up an SSH key, the session request calls an IAM role tied to a LastPass secret policy. LastPass grants short-lived credentials based on group membership. AWS checks identity through IAM, then launches a managed session. Audit trails end up in CloudTrail, while LastPass tracks credential retrievals. No human ever copies a secret. No sticky notes, no risk.
To make that stable, control your roles. Map each LastPass group to an IAM role with the least privilege needed. Rotate secrets often, and let LastPass handle expiration automatically. Use Systems Manager Parameter Store for ephemeral values that automation scripts need. Always enable CloudWatch session recording; it’s cheap insurance when compliance comes knocking.
Benefits of pairing EC2 Systems Manager with LastPass: