Monitor Non-compliant and Unsecure Resources with AWS Config
In this lab, you’ll practice the usage of AWS Config. When you’re finished with this lab, you’ll have a thorough understanding of the usage of AWS Config Rules to monitor non-compliant and unsecure resources.
Terms and conditions apply.
Review the Created Resources in your AWS Account
Review the EC2 instances and S3 buckets available in your AWS account.
Enable AWS Config and Setup Config Rules
Enable AWS Config service in your account and setup required Config Rules to monitor non-compliant and unsecure EC2 instances and S3 buckets.
Remediate the Non-compliant Resources
You need to change the security group rules of the EC2 instance. You also need to set up server side encryption for the S3 bucket.
Re-evaluate the Config Rules
You will re-evaluate the Config rules now to check the compliance status.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
- Knowledge of EC2 dashboard in Management Console
- Knowledge of S3 dashboard in Management Console