AWS Security Blog
The Most Viewed AWS Security Blog Posts so Far in 2016
The following 10 posts are the most viewed AWS Security Blog posts that we published during the first six months of this year. You can use this list as a guide to catch up on your blog reading or even read a post again that you found particularly useful.
- How to Set Up DNS Resolution Between On-Premises Networks and AWS Using AWS Directory Service and Amazon Route 53
- How to Configure Rate-Based Blacklisting with AWS WAF and AWS Lambda
- Announcing Industry Best Practices for Securing AWS Resources
- How to Use the New AWS Encryption SDK to Simplify Data Encryption and Improve Application Availability
- Adhere to IAM Best Practices in 2016
- How to Use AWS WAF to Block IP Addresses That Generate Bad Requests
- How to Optimize and Visualize Your Security Groups
- How to Set Up DNS Resolution Between On-Premises Networks and AWS Using AWS Directory Service and Microsoft Active Directory
- How to Reduce Security Threats and Operating Costs Using AWS WAF and Amazon CloudFront
- How to Add DNS Filtering to Your NAT Instance with Squid
And the following 10 posts published since the blog’s inception in April 2013 were the most viewed AWS Security Blog posts in the first half of this year.
- Writing IAM Policies: How to Grant Access to an Amazon S3 Bucket
- Securely connect to Linux instances running in a private Amazon VPC
- A New and Standardized Way to Manage Credentials in the AWS SDKs
- Where’s My Secret Access Key?
- Enabling Federation to AWS Using Windows Active Directory, ADFS, and SAML 2.0
- IAM Policies and Bucket Policies and ACLs! Oh, My! (Controlling Access to S3 Resources)
- How to Connect Your On-Premises Active Directory to AWS Using AD Connector
- Writing IAM Policies: Grant Access to User-Specific Folders in an Amazon S3 Bucket
- How to Help Prepare for DDoS Attacks by Reducing Your Attack Surface
- Demystifying EC2 Resource-Level Permissions
Let us know in the comments section below if there is a specific security or compliance topic you would like us to cover on the Security Blog in the remainder of 2016.
– Craig