AWS Security Blog

The Most Viewed AWS Security Blog Posts in 2017

September 9, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details.


AWS security image

The following 10 posts were the most viewed AWS Security Blog posts that we published during 2017. You can use this list as a guide to catch up on your AWS Security Blog reading or read a post again that you found particularly useful.

  1. Coming Soon: Improvements to How You Sign In to Your AWS Account
  2. Attach an AWS IAM Role to an Existing Amazon EC2 Instance by Using the AWS CLI
  3. AWS and the General Data Protection Regulation (GDPR)
  4. How to Protect Data at Rest with Amazon EC2 Instance Store Encryption
  5. s2n Is Now Handling 100 Percent of SSL Traffic for Amazon S3
  6. Easily Replace or Attach an IAM Role to an Existing EC2 Instance by Using the EC2 Console
  7. How to Monitor Host-Based Intrusion Detection System Alerts on Amazon EC2 Instances
  8. How to Prepare for AWS’s Move to Its Own Certificate Authority
  9. Introducing AWS Single Sign-On
  10. How to Visualize and Refine Your Network’s Security by Adding Security Group IDs to Your VPC Flow Logs

The following 10 posts published since the blog’s inception in April 2013 were the most viewed AWS Security Blog posts in 2017.

  1. Where’s My Secret Access Key?
  2. Writing IAM Policies: How to Grant Access to an Amazon S3 Bucket
  3. How to Restrict Amazon S3 Bucket Access to a Specific IAM Role
  4. Securely Connect to Linux Instances Running in a Private Amazon VPC
  5. Writing IAM Policies: Grant Access to User-Specific Folders in an Amazon S3 Bucket
  6. How to Control Access to Your Amazon Elasticsearch Service Domain
  7. Coming Soon: Improvements to How You Sign In to Your AWS Account
  8. A New and Standardized Way to Manage Credentials in the AWS SDKs
  9. How to Connect Your On-Premises Active Directory to AWS Using AD Connector
  10. Enabling Federation to AWS Using Windows Active Directory, ADFS, and SAML 2.0

Let us know in the comments section below if there is a specific security or compliance topic you would like us to cover on the Security Blog in 2018.

– Craig