AWS Security Blog
Top 11 posts during 2019
September 9, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details.
The Security Blog set new records for page views in 2019, but we’re always looking for ways to improve. Please tell us what you want to read about in the Comments section below. We read all of your feedback and do our best to act on it.
The top 11 posts during 2019 based on page views
- How to automate SAML federation to multiple AWS accounts from Microsoft Azure Active Directory
- How to securely provide database credentials to Lambda functions by using AWS Secrets Manager
- How to set up an outbound VPC proxy with domain whitelisting and content filtering
- How to centralize and automate IAM policy creation in sandbox, development, and test environments
- Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Service
- Simplify DNS management in a multi-account environment with Route 53 Resolver
- How to use service control policies to set permission guardrails across accounts in your AWS Organization
- How to share encrypted AMIs across accounts to launch encrypted EC2 instances
- AWS and the CLOUD Act
- Guidelines for protecting your AWS account while using programmatic access
- How to use AWS Secrets Manager to securely store and rotate SSH key pairs
We’d also like to highlight a couple recent posts that customers have shown a lot of interest in. These posts would’ve likely made it into the top 11 given another month or so:
- How to use CI/CD to deploy and configure AWS security services with Terraform
- Post-quantum TLS now supported in AWS KMS
If you’re new to AWS and are just discovering the Security Blog, we’ve also compiled a list of older posts that customers continue to find useful.
The top 10 posts of all time based on page views
- Where’s My Secret Access Key?
- Writing IAM Policies: How to Grant Access to an Amazon S3 Bucket
- How to Restrict Amazon S3 Bucket Access to a Specific IAM Role
- Securely Connect to Linux Instances Running in a Private Amazon VPC
- Writing IAM Policies: Grant Access to User-Specific Folders in an Amazon S3 Bucket
- IAM Policies and Bucket Policies and ACLs! Oh, My! (Controlling Access to S3 Resources)
- How to Connect Your On-Premises Active Directory to AWS Using AD Connector
- Setting the Record Straight on Bloomberg BusinessWeek’s Erroneous Article
- A New and Standardized Way to Manage Credentials in the AWS SDKs
- How to Control Access to Your Amazon Elasticsearch Service Domain
Want more AWS Security how-to content, news, and feature announcements? Follow us on Twitter.
The AWS Security team is hiring! Want to find out more? Check out our career page.