AWS Config Best Practices for Compliance

Use AWS Config the Right Way for Successful Compliance

It’s well-known that AWS Config is a powerful service for monitoring all changes across your resources. As AWS Config has constantly evolved and improved over the years, it has transformed into a true powerhouse for monitoring your deployment’s compliance. Monitoring for compliance — whether for HIPAA, CIS, internal auditors, etc. — is a detailed and complicated process, and it’s of utmost importance to provide a clear history of all actions so that auditors can easily assess and approve your organization. With that in mind, let’s check out the following three best practices to use AWS Config for Compliance.

1. Strive for the Goal of Clear Compliance Reporting

Why do you want to use AWS Config, and what are the main benefits of taking the time to learn about a new service, devise processes around implementing it, and enforce new policies within your organization? To put it succinctly, using AWS Config to monitor your compliance needs will give you a customized and organized ledger of all changes to your deployment, indicating how each resource meets compliance over time.

By running through one of Cloud Academy’s Labs, you can see that at the fundamental level, AWS Config sets up recorders to capture all resource changes in your deployment. This is very powerful because you’re going to have a programmatic log of all changes, and this huge amount of data can be used to refer back to when you get audited.

In addition, as organizations shift from monolithic applications to microservices, they start to implement the tenets of Continuous Integration and Continuous Deployment (CI/CD). AWS Config provides a valuable trail of actions that further support reporting on your internal processes — for DevOps, Security, and Financial stakeholders — at every step of the rapid CI/CD process.

This all adds up to a wealth of data that can be architected in an organized and searchable fashion to meet the needs of your compliance frameworks, making your internal stakeholders and external auditors happy.

2. Automate Rule Enforcement with Compliance-as-Code

Starting with a particular compliance framework as a reference, you can use the Config rules functionality for your own Compliance-as-Code implementation. In a nutshell, you’re going to leverage Config rules (many of which exist out-of-the-box from AWS) to report on the state of specific controls in your particular framework, whether it’s ensuring that an S3 bucket is encrypted or making sure all resources are given a specific type of name.

The power in Config rules is its out-of-the-box ease, simple customization — from type of resource to frequency of reporting — along with a clear indication of your resource’s pass/fail state. Once implemented, you have a great foundation to take your AWS Config functionality to the next level: automatic remediation of issues.

3. Use AWS Config to Automate the Remediation of Problems

In March 2019, AWS announced the ability to use AWS Config rules to automate the remediation of noncompliant resources. Using either the console or API, you have the ability to add a rule to automatically fix a noncompliant resource when it is found. This functionality is enabled within AWS by the use of AWS Systems Manager Automation documents, a set of instructions which are referenced by the Config rules and provide guidelines for actions taken on resources. Just like the Config rules, AWS System Manager Automation documents provide many default templates, as well as customizable functionality.


When you invest the time to create and implement a plan to work with your compliance requirements, using AWS Config will simplify your work and save tons of time and effort after implementation. Your compliance — as well as security and financial — needs will be met much easier because your resources will be created and maintained in an orderly way, even in the most dynamic and chaotic development and production environments.

To learn more about AWS Config in general, how to utilize it in your organization, and how to manage compliance with AWS Config, try out Cloud Academy’s AWS Config: An Introduction course. The short video below is part of the course and will give you an overview of how to best manage the compliance you need to adhere to within your AWS environment.

Joe Nemer

Written by

Joe Nemer

Joe is a Technical Researcher at Cloud Academy and works to help readers connect concepts in ways they haven't thought of before. Side interests include all sorts of waves — ocean waves, sine waves, just not goodbye waves.


Related Posts

Connie Benton
Connie Benton
— April 1, 2020

How To Build a Career with AWS Certifications

From Iaas and PaaS solutions to digital marketing, cloud computing reshapes the world of technology. As the influence of this technology grows, so does investment. Tens of billions of dollars are being spent on cloud computing-related services each year. This influx is continuing to inc...

Read more
  • AWS
  • Certifications
Vijayakumar Athithan
Vijayakumar Athithan
— March 27, 2020

What is Cognito in AWS?

Web applications usually allow a valid username and password combination for successful sign in to the application. Modern authentication flows incorporate more approaches to ensure user authentication. When using AWS, this is no exception, thanks to the abilities and features offered b...

Read more
  • AWS
  • AWS Cognito
  • Solutions Architect
Avatar
Andrew Larkin
— March 20, 2020

The 12 AWS Certifications: Which is Right for You and Your Team?

As companies increasingly shift workloads to the public cloud, cloud computing has moved from a nice-to-have to a core competency in the enterprise. This shift requires a new set of skills to design, deploy, and manage applications in cloud computing. As the market leader and most ma...

Read more
  • AWS
  • AWS Certifications
Alisha Reyes
Alisha Reyes
— March 17, 2020

Cloud Academy’s Blog Digest: How Do AWS Certifications Increase Your Employability, How to Become a Microsoft Certified Azure Data Engineer, and more

With everything going on right now, it's likely that the only thing you've been reading lately is related to the coronavirus pandemic. It's important to stay informed during these times, but it's also good to jump into something that can take your mind off of the current situation for j...

Read more
  • AWS
  • Azure
  • blog digest
  • Certifications
  • Cloud Academy
  • programming
  • Security
Avatar
Cloud Academy Team
— March 13, 2020

Which Certifications Should I Get?

As we mentioned in an earlier post, the old AWS slogan, “Cloud is the new normal” is indeed a reality today. Really, cloud has been the new normal for a while now and getting credentials has become an increasingly effective way to quickly showcase your abilities to recruiters and compan...

Read more
  • AWS
  • Azure
  • Certifications
  • Cloud Computing
  • Google Cloud Platform
Alisha Reyes
Alisha Reyes
— March 7, 2020

New on Cloud Academy: Intro to GitOps; AWS Courses; Java, Python, Amazon Linux 2, Ubuntu, & Docker Playgrounds; and much more

New Lab Playgrounds This month, our Content Team released six new "playground labs." Our playground labs provide a safe and secure sandbox environment for you to explore your own ideas, follow along with Cloud Academy courses, or answer your own questions — all without having to instal...

Read more
  • AWS
  • Azure
  • gitops
  • Google Cloud Platform
  • lab playground
  • programming
Alisha Reyes
Alisha Reyes
— March 6, 2020

New on Cloud Academy: Intro to GitOps; AWS Courses; Java, Python, Amazon Linux 2, Ubuntu, & Docker Playgrounds; and much more

New Lab Playgrounds This month, our Content Team released six new "playground labs." Our playground labs provide a safe and secure sandbox environment for you to explore your own ideas, follow along with Cloud Academy courses, or answer your own questions — all without having to instal...

Read more
  • AWS
  • Azure
  • gitops
  • Google Cloud Platform
  • lab playground
  • programming
Patrick Navarro
Patrick Navarro
— March 4, 2020

AWS Certifications: How Do They Increase Your Employability and Progress Your Career?

AWS certifications are no walk in the park. They’re designed to validate in-depth, specialist knowledge and comprehensive experience, often requiring months of dedicated studying to earn even for those already working with the cloud platform. But the rewards that AWS professionals ca...

Read more
  • AWS
  • AWS certification
  • certification
Avatar
Chandan Patra
— February 21, 2020

Elasticsearch vs. CloudSearch: AWS Cloud Search Choices

Elasticsearch vs. CloudSearch: What's the main difference? Let's compare AWS-based cloud tools: Elasticsearch vs. CloudSearch. While both services use proven technologies, Elasticsearch is more popular, open source, and has a flexible API to use for customization; in comparison, CloudS...

Read more
  • AWS
  • Azure
  • cloudsearch
  • elasticsearch
Avatar
Andrew Larkin
— February 13, 2020

Cloud Academy Content Roadmap Updates

Welcome to our Q1 2020 roadmap. This is the content we plan to build over the next three months, between February 1 - and April 30, 2020. Let's look at some of our roadmap highlights. Atlassian Bamboo for CI/CD We had a lot of requests for practical guides on how to apply DevOps tool...

Read more
  • Artificial Intelligence
  • AWS
  • Azure
  • Docker
  • Google Cloud Platform
  • Kubernetes
  • Machine Learning
Alisha Reyes
Alisha Reyes
— February 7, 2020

New on Cloud Academy: Git Labs, CKA and CKAD Lab Challenges, AWS and Azure Learning Paths, AGILE, and Much More

We just kicked off our first Free Weekend of 2020. This means we've unlocked our Training Library for just 72 hours. Until Sunday at 11:59 pm (PST), you can get unlimited access to our industry-leading learning paths, courses, certification prep exams, and our most popular hands-on labs...

Read more
  • agile
  • AWS
  • Azure
  • Google Cloud Platform
  • Linux
  • OWASP
  • programming
  • red hat
  • scrum
Avatar
Stuart Scott
— February 6, 2020

How to Encrypt an EBS Volume

Keeping data and applications safe in the cloud is one of the most visible challenges facing cloud teams in 2020. Cloud storage services where data resides are frequently a target for hackers, not because the services are inherently weak but because they are often improperly configured....

Read more
  • AWS
  • EBS
  • Encryption