- Mastering AWS Security
- Albert Anthony
- 196字
- 2021-07-02 15:44:08
AWS Config security checks
AWS Config is a continuous monitoring and assessment service that records changes in the configuration of your AWS resources. You can view the current and past configurations of a resource and use this information to troubleshoot outages, conduct security attack analysis, and much more. You can view the configuration at time and use that information to reconfigure your resources and bring them into a steady state during an outage situation.
Using Config Rules, you can run continuous assessment checks on your resources to verify that they comply with your own security policies, industry best practices, and compliance regimes such as PCI/HIPAA. For example, AWS Config provides managed Config rules to ensure that encryption is turned on for all EBS volumes in your account. You can also write a custom Config rule to essentially codify your own corporate security policies. AWS Config send you alerts in real time when a resource is wrongly configured, or when a resource violates a particular security policy.
The following figure depicts various rule sets in AWS Config; these could be custom rules or rules provided out of the box by AWS:

- 深入理解Android(卷I)
- Java異步編程實戰
- 深入實踐Spring Boot
- 算法精粹:經典計算機科學問題的Python實現
- Java項目實戰精編
- Learning Hunk
- Advanced Oracle PL/SQL Developer's Guide(Second Edition)
- jQuery Mobile移動應用開發實戰(第3版)
- 領域驅動設計:軟件核心復雜性應對之道(修訂版)
- “笨辦法”學C語言
- Flowable流程引擎實戰
- PrimeFaces Blueprints
- Nagios Core Administration Cookbook(Second Edition)
- Django Design Patterns and Best Practices
- Akka入門與實踐