- Mastering AWS Security
- Albert Anthony
- 196字
- 2021-07-02 15:44:08
AWS Config security checks
AWS Config is a continuous monitoring and assessment service that records changes in the configuration of your AWS resources. You can view the current and past configurations of a resource and use this information to troubleshoot outages, conduct security attack analysis, and much more. You can view the configuration at time and use that information to reconfigure your resources and bring them into a steady state during an outage situation.
Using Config Rules, you can run continuous assessment checks on your resources to verify that they comply with your own security policies, industry best practices, and compliance regimes such as PCI/HIPAA. For example, AWS Config provides managed Config rules to ensure that encryption is turned on for all EBS volumes in your account. You can also write a custom Config rule to essentially codify your own corporate security policies. AWS Config send you alerts in real time when a resource is wrongly configured, or when a resource violates a particular security policy.
The following figure depicts various rule sets in AWS Config; these could be custom rules or rules provided out of the box by AWS:

- Dynamics 365 for Finance and Operations Development Cookbook(Fourth Edition)
- Three.js開發(fā)指南:基于WebGL和HTML5在網(wǎng)頁(yè)上渲染3D圖形和動(dòng)畫(原書第3版)
- 青少年美育趣味課堂:XMind思維導(dǎo)圖制作
- Scratch 3.0少兒編程與邏輯思維訓(xùn)練
- Java軟件開發(fā)基礎(chǔ)
- 你不知道的JavaScript(中卷)
- Mastering Unity 2D Game Development(Second Edition)
- IBM Cognos Business Intelligence 10.1 Dashboarding cookbook
- 一本書講透Java線程:原理與實(shí)踐
- 軟件測(cè)試教程
- iPhone應(yīng)用開發(fā)從入門到精通
- Python大學(xué)實(shí)用教程
- Web程序設(shè)計(jì):ASP.NET(第2版)
- SQL Server on Linux
- RESTful Web API Design with Node.js(Second Edition)