Integrations
AWS Services
AWS Security Hub
AWS Backup
AWS Control Tower
AWS Audit Manager
AWS Firewall Manager
AWS Systems Manager
AWS Config Partners
Security in AWS Config
Data Protection in AWS Config
AWS Identity and Access Management
AWS managed policies for AWS Config
Logging and Monitoring in AWS Config
Using AWS Config with Interface Amazon VPC Endpoints
Incident Response in AWS Config
Compliance Validation for AWS Config
Resilience in AWS Config
Infrastructure Security in AWS Config
Security Best Practices for AWS Config
AWS Config Documentation Resources
AWS Config Rules Repository
Documentation
Developer guide
Multi-Account Multi-Region Data Aggregation
Setting Up an Aggregator
Authorizing Aggregator Accounts
Viewing Compliance Data in the Aggregator Dashboard
Troubleshooting
Concepts
AWS Resources
Config Rule Types
AWS Managed Rules
service-linked rules
Custom (customer) Rules
Conformance Packs
AWS Control Tower Detective Guardrails Conformance Pack
Operational Best Practices for ABS CCIG 2.0 Material Workloads
Operational Best Practices for ABS CCIG 2.0 Standard Workloads
Operational Best Practices for ACSC Essential 8
Operational Best Practices for ACSC ISM
Operational Best Practices for AI and ML
Operational Best Practices for Amazon API Gateway
Operational Best Practices for Amazon DynamoDB
Operational Best Practices for Amazon S3
Operational Best Practices for APRA CPG 234
Operational Best Practices for Asset Management
Operational Best Practices for AWS Backup
Operational Best Practices for AWS Identity And Access Management
Operational Best Practices for AWS Well-Architected Framework Reliability Pillar
Operational Best Practices for AWS Well-Architected Framework Security Pillar
Operational Best Practices for BCP and DR
Operational Best Practices for BNM RMiT
Operational Best Practices for CIS AWS Foundations Benchmark v1.4 Level 1
Operational Best Practices for CIS AWS Foundations Benchmark v1.4 Level 2
Operational Best Practices for CIS Critical Security Controls v8 IG1
Operational Best Practices for CIS Critical Security Controls v8 IG2
Operational Best Practices for CIS Critical Security Controls v8 IG3
Operational Best Practices for CIS Top 20
Operational Best Practices for CISA Cyber Essentials
Operational Best Practices for CMMC Level 1
Operational Best Practices for CMMC Level 2
Operational Best Practices for CMMC Level 3
Operational Best Practices for CMMC Level 4
Operational Best Practices for CMMC Level 5
Operational Best Practices for Compute Services
Operational Best Practices for Data Resiliency
Operational Best Practices for Databases Services
Operational Best Practices for Data Lakes and Analytics Services
Operational Best Practices for DevOps
Operational Best Practices for EC2
Operational Best Practices for Encryption and Key Management
Operational Best Practices for ENISA Cybersecurity guide for SMEs
Operational Best Practices for Esquema Nacional de Seguridad (ENS) Low
Operational Best Practices for Esquema Nacional de Seguridad (ENS) Medium
Operational Best Practices for Esquema Nacional de Seguridad (ENS) High
Operational Best Practices for FDA Title 21 CFR Part 11
Operational Best Practices for FedRAMP(Low)
Operational Best Practices for FedRAMP(Moderate)
Operational Best Practices for FFIEC
Operational Best Practices for HIPAA Security
Operational Best Practices for K-ISMS
Operational Best Practices for Load Balancing
Operational Best Practices for Logging
Operational Best Practices for Management and Governance Services
Operational Best Practices for MAS Notice 655
Operational Best Practices for MAS TRMG
Operational Best Practices for Monitoring
Operational Best Practices for NBC TRMG
Operational Best Practices for NERC CIP
Operational Best Practices for NCSC Cloud Security Principles
Operational Best Practices for NCSC Cyber Assesment Framework
Operational Best Practices for Networking and Content Delivery Services
Operational Best Practices for NIST 800-53 rev 4
Operational Best Practices for NIST 800-53 rev 5
Operational Best Practices for NIST 800 171
Operational Best Practices for NIST 800 172
Operational Best Practices for NIST 800 181
Operational Best Practices for NIST 1800 25
Operational Best Practices for NIST CSF
Operational Best Practices for NIST Privacy Framework v1.0
Operational Best Practices for NYDFS 23
Operational Best Practices for NZISM
Operational Best Practices for PCI DSS 3.2.1
Operational Best Practices for Publicly Accessible Resources
Operational Best Practices for RBI Cyber Security Framework for UCBs
Operational Best Practices for RBI MD-ITF
Operational Best Practices for Security, Identity, and Compliance Services
Operational Best Practices for Serverless
Operational Best Practices for Storage Services
Example Templates with Remediation Action
Custom Conformance Pack
Trigger types
Configuration changes
Periodic
Configuration History
Configuration Items
Metadata
Attributes
Relationships
Current configuration
Configuration Recorder
Configuration Snapshot
Configuration Stream
Resource Relationship
Common Scenarios
Resource Administration
Auditing and Compliance
Managing and Troubleshooting Configuration Changes
Security Analysis
AWS re:Post questions for AWS Config
Free Cybersecurity Training
AWS Config Pricing
AWS Config Blogs
AWS Config FAQs