π‘οΈ AWS Account Config is not enabled in all regionsπ’
- Contextual name: π‘οΈ Config is not enabled in all regionsπ’
- ID:
/ce/ca/aws/account/config-in-all-regions - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
RELIABILITY,SECURITY
Logicβ
- π§ prod.logic.yamlπ’
- π AWS Account
- π AWS Config Recorder - object.extracts.yaml
- π§ͺ test-data.json
Similar Policiesβ
- Cloud Conformity: AWS Config Enabled
- Internal:
dec-x-88fa51c8
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-x-88fa51c8 | 1 |
Descriptionβ
Descriptionβ
AWS Config is a web service that performs configuration management of supported AWS resources within your account and delivers log files to you. The recorded information includes the configuration item (AWS resource), relationships between configuration items (AWS resources), any configuration changes between resources. It is recommended AWS Config be enabled in all regions.
Rationaleβ
The AWS configuration item history captured by AWS Config enables security analysis, resource change tracking, and compliance auditing.
Impactβ
Enabling AWS Config in all regions provides comprehensive visibility into resource configurations, enhancing security and compliance monitoring. However, this may incur additional costs and require proper configuration management.
Auditβ
Process to evaluate AWS Config configuration per region:
From Consoleβ
- Sign in to the AWS Management Console and open the AWS Config console at https://console.aws.amazon.com/config/.
- On the top right of the console select target Region.
... see more
Remediationβ
Remediationβ
To implement AWS Config configuration:
From Consoleβ
- Select the region you want to focus on in the top right of the console.
- Click
Services.- Click
Config.- If a Config recorder is enabled in this region, you should navigate to the Settings page from the navigation menu on the left hand side. If a Config recorder is not yet enabled in this region then you should select
Get Started.- Select
Record all resources supported in this region.- Choose to include global resources (IAM resources).
- Specify an S3 bucket in the same account or in another managed AWS account.
- Create an SNS Topic from the same AWS account or another managed AWS account.
From Command Lineβ
- Ensure there is an appropriate S3 bucket, SNS topic, and IAM role per the AWS Config Service prerequisites.
- Run this command to create a new configuration recorder:
aws configservice put-configuration-recorder --configuration-recorder name=default,roleARN=arn:aws:iam::012345678912:role/myConfigRole --recording-group allSupported=true,includeGlobalResourceTypes=true
... [see more](remediation.md)