Handy? That sounds like a security nightmare. Your instances are accessible by simply being able to gain access to the Google account? Even with 2-factor authentication, this is a serious no-no to basic security requirements. A remote server should be only accessible from specific IPs using ssh keys. No passwords, no world-accessible browser interface.
> A remote server should be only accessible from specific IPs using ssh keys. No passwords, no world-accessible browser interface.
Maybe if you own the servers.
Since they're Google's or Amazon's servers you have to be able to administer them with some set of Google or Amazon credentials. Otherwise what would you do if sshd crashed?
I understand your point. I host on linode which has Lish (an out-of-bound terminal that gives you command-line access without ssh). I have it turned off normally, but again can be turned on by anyone who gains access to my account with credentials and 2-factor auth. It should take a lot more from an attacker to be able to access your servers.
How does that add any security? Anyone with access to your root AWS credentials still has your IP addresses and your EBS volumes/snapshots and can do whatever they want.
This is the trade off I've wrestled with. I've kicked around setting up a Clound9 IDE with access to our environments, so that I can access and repair any of our production environments remotely without needing my laptop.