Profile Applicability:
Level 2
Description:
AWS Config is a managed service that continuously monitors and records AWS resource configurations. It tracks changes, compliance status, and relationships between resources across AWS accounts.
Why Enable AWS Config?
Monitors AWS resource changes in real time.
Tracks compliance with security policies.
Helps detect unauthorized changes to infrastructure.
Supports auditing & forensics in case of security incidents.
Ensures compliance with CIS, SOC 2, PCI-DSS, HIPAA, and ISO 27001.
Rationale:
Provides historical change tracking of AWS resources.
Improves security posture by tracking misconfigurations.
Enables continuous compliance monitoring.
Helps with post-incident forensic analysis.
Impact:
Pros:
Helps detect misconfigurations & unauthorized changes.
Supports auditing and regulatory compliance.
Improves security monitoring and troubleshooting.
Cons:
Incurs additional costs for AWS Config logs stored in S3.
Requires proper configuration (SNS notifications, S3 logging).
Default Value:
AWS Config is NOT enabled by default in all regions. Must be manually enabled per AWS account & region.
Pre-Requisites:
IAM permissions required:
config:PutConfigurationRecorder
config:PutDeliveryChannel
config:StartConfigurationRecorder
s3:PutBucketPolicy
sns:CreateTopic
AWS CLI installed for automation.
Remediation:
Test Plan:
Using AWS Console
Step 1: Check AWS Config Status
Log in to the AWS Management Console
Navigate to AWS Config Console → AWS Config Dashboard
Select each AWS Region
If AWS Config is enabled, you will see:
Config Recorder = Enabled
Record All AWS Resources = Enabled
Include Global Resources = Enabled
S3 bucket & SNS Topic configured
Repeat for all AWS Regions.
If AWS Config is enabled in all regions, no further action is needed.
If AWS Config is disabled in any region, follow remediation steps.
Using AWS CLI
Step 1: Check AWS Config Recorders
aws configservice describe-configuration-recorders --query 'ConfigurationRecorders[*]'
Expected Output (if AWS Config is enabled):
[ { "name": "default", "roleARN": "arn:aws:iam::123456789012:role/service-role/AWSConfigRole", "recordingGroup": { "allSupported": true, "includeGlobalResourceTypes": true } } ]
If allSupported is false, AWS Config is not tracking all resources!
Step 2: Check AWS Config Recorder Status
aws configservice describe-configuration-recorder-status --query 'ConfigurationRecordersStatus[*]'
Expected Output (if AWS Config is running):
[ { "name": "default", "recording": true, "lastStatus": "SUCCESS" } ]
If recording=false, AWS Config is not capturing changes!
Implementation Steps:
Method 1: Enable AWS Config via AWS Console
Step 1: Enable AWS Config in Each Region
Log in to the AWS Console
Navigate to AWS Config Console
Select a Region
Click Get Started (if AWS Config is not enabled)
Select "Record all resources supported in this region"
Enable Global Resource Tracking (IAM, CloudFront, Route53)
Select S3 Bucket & SNS Topic for logs
Click Save changes
Repeat for all AWS Regions.
Enable AWS Config via AWS CLI
Step 1: Enable AWS Config Recorder
aws configservice put-configuration-recorder \ --configuration-recorder name=default \ --role-arn arn:aws:iam::123456789012:role/AWSConfigRole \ --recording-group allSupported=true,includeGlobalResourceTypes=true
This command enables AWS Config in all regions.
Step 2: Set Up AWS Config Delivery Channel
{ "name": "default", "s3BucketName": "my-config-bucket", "snsTopicARN": "arn:aws:sns:us-east-1:123456789012:MyTopic", "configSnapshotDeliveryProperties": { "deliveryFrequency": "Twelve_Hours" } }
- This command sets up AWS Config logging to S3 & SNS.
aws configservice put-delivery-channel --delivery-channel file://config-delivery.json
Step 3: Start AWS Config Recorder
aws configservice start-configuration-recorder --configuration-recorder-name default
This command starts AWS Config monitoring.
Backout Plan:
If AWS Config causes issues:
- Stop AWS Config Recorder:
aws configservice stop-configuration-recorder --configuration-recorder-name default
- Delete AWS Config Delivery Channel:
aws configservice delete-delivery-channel --delivery-channel-name default
- Delete AWS Config Recorder:
aws configservice delete-configuration-recorder --configuration-recorder-name default
Ensure disabling AWS Config is justified before proceeding.