Start a Project

AWS Config – Audit and Record your AWS Resources!

The widespread availability of public cloud services such as AWS has created a slew of advantages for companies.

Quick infrastructure setup, scaling with a few clicks, and delegating service management so you can focus on your product are just a few examples.

Working with a public cloud service, on the other hand, comes with its own set of issues, one of which is the difficulty of auditing your resources, which is where AWS Config comes in.

AWS Config

AWS Config is a service that lets users review, audit and evaluate AWS resource configurations.

Config continually monitors and records AWS resource configurations, in order to allow users to compare recorded configurations against desired configurations in an automated manner.

Users can utilize Config to examine changes in configurations and interactions across AWS resources, look into specific resource configuration histories, and assess overall compliance with internal rules.

This makes compliance auditing, security analysis, change management, and operational troubleshooting much easier for users.

AWS Config Rules

AWS Config Rules allow you to specify desired configuration parameters for individual resources or the entire account.

It monitors resource configuration modifications against the rules and flags resources that are out of compliance.

There are basically 2 types of rules –

AWS Config Managed Rules

Config managed rules are pre-built and are administered by AWS. AWS takes care of maintaining and updating the rules for you, therefore, which is really convenient. In compliance with common best practices, you can customize managed rules.

Let’s discuss some of the predefined AWS Config Managed Rules –

iam-root-access-key-check

Checks for the availability of the root user’s access key. If the user access key does not exist, then the rule is COMPLIANT. NON-COMPLIANT otherwise.

Region not supported – Asia Pacific (Osaka)

root-account-mfa-enabled

Checks if your AWS account’s root user requires multi-factor authentication for console sign-in.

Region not supported – China (Beijing), China (Ningxia), AWS GovCloud (US-East), AWS GovCloud (US-West) Region

access-keys-rotated

Checks if the active access keys have been rotated within the specified maximum number of days. If the access keys have not been rotated for more than specified, then the rule is NON-COMPLIANT.

Region not supported – All Regions Supported

s3-bucket-public-read-prohibited

Checks if public read access to your Amazon S3 buckets is disabled.

Regions not Supported – All Regions Supported

ec2-instance-no-public-ip

Checks Amazon EC2 instances are associated with a public IP address. If the public field is present in the Amazon EC2 instance configuration item, then the rule is NON-COMPLIANT. However, This regulation only applies to IPv4 addresses.

Regions not supported – Asia Pacific (Osaka) Region

desired-instance-type

Checks to see if your EC2 instances are of the specified class.

Regions not Supported – All Regions Supported

We’ve only covered a few of these rules, but there are plenty more that can help you protect your cloud resources. For further rules, please visit AWS Config Managed Rules.

AWS Config Custom Rules

AWS Lambda functions have custom rules that we can customize to match our needs. They prove to be useful when the managed rules aren’t quite up to the task.

This is where AWS Lambda and serverless technology come into play. You may establish your security and compliance posture and add your own custom business logic.

AWS Config Benefits

How AWS Config Works?

With Config Rules –

Example

Let’s understand the working of AWS Config using a use case example –

Let’s suppose we are running an ERP solution. After benchmarking our application under different scenarios, we concluded that t2.medium (i.e, 2 vCPU and 4 GB RAM) gives us desirable performance.

If we scale down the server, it may lead to degraded app performance and will affect the user experience also and server scale-up related changes will unnecessarily add extra cost to the AWS billing.

In this case, we will use AWS Config to track our AWS resource configurations to compare our current configurations against desired configurations.

We can use custom rules to implement our own business logic by using the Lambda function defining our benchmarked server configuration which says configuration should not be lesser or higher than the required configurations.

After enabling AWS config, it will audit our resources and will trigger the Lambda function if any change is found. Lambda will implement the business logic and therefore, will check the configurations for what we had set and with what is desired.

In this way, AWS config helps organizations ensure that the desired configurations are maintained on critical resources/services.

Pricing

Every AWS Region, you pay $0.003 per configuration item stored in your AWS account. Every time a resource’s configuration or relationship changes, therefore, it creates a configuration item.

You will have to pay only for the number of AWS Config rules evaluations recorded, not for the number of active rules in your account per region.

AWS Config rule evaluationPrice
First 100,000 rule evaluations
$0.001 per rule evaluation per region
Next 400,000 rule evaluations (100,001-500,000)
$0.0008 per rule evaluation per region
500,001 and more rule evaluations
$0.0005 per rule evaluation per region

For further details about AWS Config pricing, please refer to the Link.

Conclusion

AWS Config makes it simple to keep your cloud environment secure and compliant thanks to its preset rules that can be installed quickly and easily.

Hence, AWS Config is a powerful feature that every organization using Amazon’s cloud should consider.

In our next blog, we will further discuss how we can manage our Multiple accounts in AWS.

Need Support?

Thank You for reading this Blog!

For further more interesting blogs, keep in touch with us. If you need any kind of support, simply raise a ticket at https://webkul.uvdesk.com/en/.

For Magento 2 Elastic search, please follow –

Our Cloudkul Blogs

Elasticsearch, Fluentd, and Kibana (EFK) 

Setting up Elasticsearch, Logstash, and Kibana for centralized logging

Managing and Monitoring Magento 2 logs with Kibana

Our store modules –

Magento 2 Elasticsearch

EFK Setup for Magento 2

You may also visit our Magento development services and quality  Magento 2 Extensions.

For further help or query, please contact us or raise a ticket.

Exit mobile version