AWS Security Blog

The Most Viewed AWS Security Blog Posts in 2017

September 9, 2021: HAQM Elasticsearch Service has been renamed to HAQM OpenSearch Service. See details.


AWS security image

The following 10 posts were the most viewed AWS Security Blog posts that we published during 2017. You can use this list as a guide to catch up on your AWS Security Blog reading or read a post again that you found particularly useful.

  1. Coming Soon: Improvements to How You Sign In to Your AWS Account
  2. Attach an AWS IAM Role to an Existing HAQM EC2 Instance by Using the AWS CLI
  3. AWS and the General Data Protection Regulation (GDPR)
  4. How to Protect Data at Rest with HAQM EC2 Instance Store Encryption
  5. s2n Is Now Handling 100 Percent of SSL Traffic for HAQM S3
  6. Easily Replace or Attach an IAM Role to an Existing EC2 Instance by Using the EC2 Console
  7. How to Monitor Host-Based Intrusion Detection System Alerts on HAQM EC2 Instances
  8. How to Prepare for AWS’s Move to Its Own Certificate Authority
  9. Introducing AWS Single Sign-On
  10. How to Visualize and Refine Your Network’s Security by Adding Security Group IDs to Your VPC Flow Logs

The following 10 posts published since the blog’s inception in April 2013 were the most viewed AWS Security Blog posts in 2017.

  1. Where’s My Secret Access Key?
  2. Writing IAM Policies: How to Grant Access to an HAQM S3 Bucket
  3. How to Restrict HAQM S3 Bucket Access to a Specific IAM Role
  4. Securely Connect to Linux Instances Running in a Private HAQM VPC
  5. Writing IAM Policies: Grant Access to User-Specific Folders in an HAQM S3 Bucket
  6. How to Control Access to Your HAQM Elasticsearch Service Domain
  7. Coming Soon: Improvements to How You Sign In to Your AWS Account
  8. A New and Standardized Way to Manage Credentials in the AWS SDKs
  9. How to Connect Your On-Premises Active Directory to AWS Using AD Connector
  10. Enabling Federation to AWS Using Windows Active Directory, ADFS, and SAML 2.0

Let us know in the comments section below if there is a specific security or compliance topic you would like us to cover on the Security Blog in 2018.

– Craig