- Mastering AWS Security
- Albert Anthony
- 196字
- 2021-07-02 15:44:08
AWS Config security checks
AWS Config is a continuous monitoring and assessment service that records changes in the configuration of your AWS resources. You can view the current and past configurations of a resource and use this information to troubleshoot outages, conduct security attack analysis, and much more. You can view the configuration at time and use that information to reconfigure your resources and bring them into a steady state during an outage situation.
Using Config Rules, you can run continuous assessment checks on your resources to verify that they comply with your own security policies, industry best practices, and compliance regimes such as PCI/HIPAA. For example, AWS Config provides managed Config rules to ensure that encryption is turned on for all EBS volumes in your account. You can also write a custom Config rule to essentially codify your own corporate security policies. AWS Config send you alerts in real time when a resource is wrongly configured, or when a resource violates a particular security policy.
The following figure depicts various rule sets in AWS Config; these could be custom rules or rules provided out of the box by AWS:

- Rust實戰
- Microsoft Dynamics 365 Extensions Cookbook
- HTML5 移動Web開發從入門到精通(微課精編版)
- 看透JavaScript:原理、方法與實踐
- Android NDK Beginner’s Guide
- Cassandra Data Modeling and Analysis
- YARN Essentials
- 單片機應用技術
- Reactive Programming With Java 9
- 精通Python自動化編程
- Node Cookbook(Second Edition)
- D3.js By Example
- Learning Modular Java Programming
- 零基礎學HTML+CSS
- Python 3快速入門與實戰