<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Hatice</title>
    <description>The latest articles on DEV Community by Hatice (@hatice_ozsahan).</description>
    <link>https://dev.to/hatice_ozsahan</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F860847%2Fff0052f1-e954-4c4c-a82d-337d88726269.jpg</url>
      <title>DEV Community: Hatice</title>
      <link>https://dev.to/hatice_ozsahan</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/hatice_ozsahan"/>
    <language>en</language>
    <item>
      <title>Identity and Access Management (IAM) Best Practices for Security</title>
      <dc:creator>Hatice</dc:creator>
      <pubDate>Wed, 05 Apr 2023 09:56:20 +0000</pubDate>
      <link>https://dev.to/hatice_ozsahan/identity-and-access-management-iam-best-practices-that-shouldnt-be-an-afterthought-5afo</link>
      <guid>https://dev.to/hatice_ozsahan/identity-and-access-management-iam-best-practices-that-shouldnt-be-an-afterthought-5afo</guid>
      <description>&lt;p&gt;Identity and Access Management (IAM) is crucial to every cloud security strategy, but it often flies under the radar. IAM ensures that only the right, authorized people and job roles in your organization (identities) have access to your cloud resources. Ultimately, it helps manage a range of identities, including users, software, and hardware.&lt;/p&gt;

&lt;p&gt;To give it a bit of perspective, IAM brings two core advantages; security and productivity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Traditional security revolves around users and their passwords which can quickly get exposed, making organizations vulnerable to attacks. IAM services narrow down attack vectors, complicate the potential hacking process, and backstops to catch mistakes earlier.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Productivity:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once employees log in to the main IAM portal, they no longer need to worry about typing in the correct passwords or having the right access level to complete their tasks. Their access and permissions can easily be managed as a group or role instead of going through each individually. &lt;/p&gt;

&lt;p&gt;Don’t ever say, “&lt;em&gt;we’ll cross that bridge once we get to it&lt;/em&gt;.” There’s no shortcut for security, so today is the day you’ll learn IAM best practices.&lt;/p&gt;

&lt;p&gt;For a quick, all-cards-on-the-table summary, the &lt;strong&gt;top 10 IAM best practices&lt;/strong&gt; include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Adopt the principle of least privilege&lt;/li&gt;
&lt;li&gt;Enforce multifactor authentication (MFA)&lt;/li&gt;
&lt;li&gt;Periodically rotate access keys&lt;/li&gt;
&lt;li&gt;Use temporary security credentials&lt;/li&gt;
&lt;li&gt;Regularly audit logs&lt;/li&gt;
&lt;li&gt;Grant permissions by roles&lt;/li&gt;
&lt;li&gt;Deprovision unused IAM accounts&lt;/li&gt;
&lt;li&gt;Leverage Separation of Duties&lt;/li&gt;
&lt;li&gt;Properly manage administrator credentials&lt;/li&gt;
&lt;li&gt;Safeguard root user account&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Let’s dive deeper.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“What we should actually be doing is thinking about what are our key controls that will mitigate the risks. How do we have those funneled and controlled through the team that we have, how do we work through that in a well-formatted, formulated process, and pay attention to those controls we have chosen? Not a continual, add more, add more, add more.” — Dr. Chris Pierson, CEO, Binary Sun Cyber Risk Advisors, at SecureWorld Charlotte.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Top 13 Security Best Practices in IAM
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Adopt the principle of least privilege
&lt;/h3&gt;

&lt;p&gt;One of the basic IAM best practices you should adopt is being extra stingy when handing out privileges. There’s even a principle for that. The Principle of Least Privilege restricts granted user privileges to only what’s necessary to complete a given task. It states that a user or program should operate with the least privileges possible. The primary goal is to limit potential damages from an accident or error.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If a user doesn’t need access to complete the task, they shouldn’t have the privilege.
This principle helps DevOps and security teams substantially reduce the blast radius of a vulnerability or attack by cutting down on the permissions linked to an account.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, the IAM cloud best practice is to grant only the exact amount of privileges required to perform a task. To take it a bit further with a better approach, continuously maintain the least privilege and get alerted when a change occurs.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Enforce multifactor authentication (MFA)
&lt;/h3&gt;

&lt;p&gt;Multifactor authentication adds an extra layer of protection against cyber threats by complicating the hacking process. Therefore, it’s the cornerstone of security at a fundamental level. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NsD0efBq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/85cq2cr65nsyxp7aia5m.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NsD0efBq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/85cq2cr65nsyxp7aia5m.jpeg" alt="MFA meme" width="666" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With MFA enabled, even if a malicious actor steals an account’s credentials, they won’t be able to verify a valid identity without a physical or virtual MFA token. As a general rule of thumb and cloud IAM security, activate MFA for all your cloud accounts. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS IAM best practice:&lt;/strong&gt; When you &lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa.html"&gt;configure MFA&lt;/a&gt; for the root user, it applies to only root user credentials. Since IAM users in your account are distinct identities with different credentials, each has its own MFA configuration. &lt;/p&gt;

&lt;p&gt;Also, see the &lt;a href="https://cloud.google.com/identity/solutions/enforce-mfa"&gt;GCP uniform MFA enforcement doc&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Periodically rotate access keys
&lt;/h3&gt;

&lt;p&gt;Users in a cloud account should regularly rotate access tokens as an IAM security best practice. Rotating Identity Access Management (IAM) credentials significantly minimize the risk of compromising credentials. Rotation shortens the activeness period of an access key, making it expire within the designated schedule. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The process involves:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Creating new access tokens.&lt;/li&gt;
&lt;li&gt;Changing the old tokens used by your applications.&lt;/li&gt;
&lt;li&gt;Deleting the old tokens.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Like changing credentials, periodically changing API tokens also limits the damage an exposed API token can cause.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;How often should you rotate access keys? *&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;You should rotate your access keys every 90 days or less, like 45 days. A cyber asset security solution can automate the process for you and continuously check the rotation status of your tokens.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JgpjGwjD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wzsl9geojul1ctoyx6b3.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JgpjGwjD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wzsl9geojul1ctoyx6b3.jpeg" alt="cloud security meme by CloudTweaks" width="880" height="816"&gt;&lt;/a&gt; Source: CloudTweaks&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Use temporary security credentials
&lt;/h3&gt;

&lt;p&gt;Another Identity Access Management best practice is using temporary security credentials instead of long-term access to your cloud environment. You should use temporary credentials whenever and wherever possible. &lt;/p&gt;

&lt;p&gt;This can be achieved with &lt;strong&gt;IAM roles&lt;/strong&gt;, which grant access to your cloud account through short-term credentials. Authorized identities can this way assume roles to make a request.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Regularly audit logs
&lt;/h3&gt;

&lt;p&gt;As an IAM cloud best practice, you should regularly audit your logs to identify anomalies in time and prevent potential attacks or exposure. Typically, cloud providers provide specific ways to audit logs. Google Cloud users, for example, can &lt;a href="https://cloud.google.com/logging/docs/audit"&gt;Cloud Audit Logs&lt;/a&gt; to regularly audit changes. AWS users, on the other hand, can monitor the account activity of specific IAM users, roles, and AWS access keys by using either of the &lt;a href="https://aws.amazon.com/premiumsupport/knowledge-center/view-iam-history/"&gt;following solutions&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS CloudTrail event history&lt;/li&gt;
&lt;li&gt;Amazon Athena queries&lt;/li&gt;
&lt;li&gt;Amazon CloudWatch Logs Insights&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  6. Grant permissions by roles
&lt;/h3&gt;

&lt;p&gt;We briefly mentioned assuming roles under Using Temporary Credentials, but it’s worth underlining. As opposed to using an administrator identity to perform regular tasks, designate new roles for different tasks that can be assumed when needed.&lt;/p&gt;

&lt;p&gt;Assuming roles require tokens or sessions which are temporary and can be revoked. Therefore it’s less risky than giving out long-term credentials to just anyone. You know, caution is parent to safety.&lt;/p&gt;

&lt;h3&gt;
  
  
  7. Deprovision unused IAM accounts
&lt;/h3&gt;

&lt;p&gt;Ultimately, it’s best to de-provision all identities when you no longer need them. Some identities, for example, might never be used or belong to a former employee. These dormant IAM accounts lead to attack surface expansion and serious vulnerabilities like ticking bombs ready to explode if spotted by a threat actor. &lt;/p&gt;

&lt;h3&gt;
  
  
  8. Leverage Separation of Duties (SoD)
&lt;/h3&gt;

&lt;p&gt;Another identity access management best practice to avoid security or privacy incidents is to separate duties. Let’s dig into what that means. The separation of Duties (&lt;a href="https://cloud.google.com/kms/docs/separation-of-duties#:~:text=Separation%20of%20duties%20is%20the,not%20normally%20have%20access%20to."&gt;SoD&lt;/a&gt;) concept ensures that no user has enough permissions to misuse. It could be an action such as accessing and decrypting data that should not normally be available to that user.&lt;/p&gt;

&lt;p&gt;Ultimately, segregation of duties requires breaking down tasks into multiple tasks or having more than one person complete the tasks. It can be enforced in the following ways:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Statically:&lt;/strong&gt; i.e., by defining conflicting roles or roles that can’t be performed by the same person&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Dynamically:&lt;/strong&gt; i.e., by enforcing the control at access time&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It might be challenging to achieve with limited staff. Still, it surely has benefits like prevention of abuse, fraud, or error as well as detection of control failures such as security breaches.&lt;/p&gt;

&lt;h3&gt;
  
  
  9. Properly manage administrator credentials
&lt;/h3&gt;

&lt;p&gt;As one of the access control best practices, ensure that administrator credentials strictly belong to the administrators and no one else. Give each admin their own admin account to log in to the Admin console instead of using the same account. Otherwise, you wouldn’t be able to tell who is responsible for a certain activity even though you see the activity in the audit log.&lt;/p&gt;

&lt;h3&gt;
  
  
  10. Safeguard root user account
&lt;/h3&gt;

&lt;p&gt;The root user account has access to and control over everything in a cloud environment, even your billing information. Unlike Identity and Access Management users and groups, it’s not possible to reduce an AWS root user’s permissions or restrict access. Therefore, it’s imperative that you protect AWS root user keys at all costs. If a malicious user has access to your root user credentials, such as a disgruntled employee or contractor, they can cause irreversible damage.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Do not create access keys for the root user unless it’s definitely required.&lt;/li&gt;
&lt;li&gt;Instead, use the account email and password to open the Management Console, create an IAM user for yourself, then grant it admin privileges.&lt;/li&gt;
&lt;li&gt;If you still choose to keep the root user access key, you should rotate it every 90 days or less. &lt;/li&gt;
&lt;li&gt;Ensure the root user account complies with cloud security best practices like activating MFA. &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  11. Secure user access keys
&lt;/h3&gt;

&lt;p&gt;Access keys are long-term credentials for IAM users or AWS account root users. These keys provide programmatic sign-in requests to a cloud environment. As an IAM best practice, it’s recommended that you use temporary credentials, a.k.a. IAM roles, instead of long-term ones like access keys. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Do not generate access keys for the root user account.&lt;/li&gt;
&lt;li&gt;There might be access keys that were created and forgotten about. If you use access keys, make sure to put automation in place to detect and delete unused and inactive keys.&lt;/li&gt;
&lt;li&gt;Regularly rotate the access keys.&lt;/li&gt;
&lt;li&gt;Do not provide access keys to any third parties.
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  12. Adopt a zero-trust policy
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zh2enlpR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gafkr86mttrxh33cs00p.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zh2enlpR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gafkr86mttrxh33cs00p.jpeg" alt="zero trust meme" width="880" height="307"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Zero Trust relies on these core principles “never trust, always verify.” Adopting a Zero-Trust security strategy goes hand in hand with IAM best practices because Zero Trust architecture’s foundational rule applies least-privilege access. &lt;/p&gt;

&lt;h3&gt;
  
  
  13. Continuously audit cloud IAM security
&lt;/h3&gt;

&lt;p&gt;Last but not least, Identity and Access Management best practice is acknowledging that security at all levels requires continuity. You should be able to tell if your cloud environment follows these IAM best practices whenever anything goes sideways. This can be done with a third-party cyber asset attack surface management tool like &lt;a href="https://www.resmo.com/"&gt;Resmo&lt;/a&gt;. &lt;/p&gt;

&lt;h2&gt;
  
  
  Cloud IAM security FAQ
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. What are the best practices for IAM?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;IAM best practices include:&lt;/li&gt;
&lt;li&gt;Adopting the Principle of Least Privilege.&lt;/li&gt;
&lt;li&gt;Separation of Duties.&lt;/li&gt;
&lt;li&gt;Enforcing MFA.&lt;/li&gt;
&lt;li&gt;Protecting your root user account.&lt;/li&gt;
&lt;li&gt;Securing access keys.&lt;/li&gt;
&lt;li&gt;Using temporary credentials.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. What is the best practice for IAM authorization?
&lt;/h3&gt;

&lt;p&gt;Use temporary security credentials, such as granting access through IAM roles, instead of giving long-term credentials, which can easily be used as an attack vector.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. What are the 4 components of IAM?
&lt;/h3&gt;

&lt;p&gt;The 4 main components of IAM are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Access Management&lt;/li&gt;
&lt;li&gt;Privileged Account Management&lt;/li&gt;
&lt;li&gt;Identity Administration&lt;/li&gt;
&lt;li&gt;Access Governance&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>security</category>
      <category>devops</category>
    </item>
    <item>
      <title>Introduction to AWS Config: Simplified Cloud Monitoring</title>
      <dc:creator>Hatice</dc:creator>
      <pubDate>Mon, 16 May 2022 13:58:15 +0000</pubDate>
      <link>https://dev.to/hatice_ozsahan/introduction-to-aws-config-simplified-cloud-monitoring-1hdn</link>
      <guid>https://dev.to/hatice_ozsahan/introduction-to-aws-config-simplified-cloud-monitoring-1hdn</guid>
      <description>&lt;p&gt;Modern cloud environments are ever-changing, and so is the nature of cloud computing. The growing cloud assets accompany the &lt;a href="https://www.resmo.com/blog/reasons-behind-attack-surface-expansion"&gt;attack surface expansion&lt;/a&gt; problem for organizations, which unveils the need for visibility of cloud resources. AWS Config addresses that exact demand. It can be challenging to understand resources within your infrastructure like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Seeing what resources you have&lt;/li&gt;
&lt;li&gt;Understanding your current configurations&lt;/li&gt;
&lt;li&gt;Knowledge of configuration changes and change histories&lt;/li&gt;
&lt;li&gt;Assessing if your resources are compliant with specific governance controls&lt;/li&gt;
&lt;li&gt;Having accurate and up-to-date audit information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Depending on the size of your AWS resources or deployment, overcoming these challenges and obtaining this information can become time-consuming and budget-intensive unless you use a resource visibility and auditing tool like &lt;a href="https://www.resmo.com/blog/introduction-to-aws-config#"&gt;AWS Config&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;This blog aims to get you started with AWS Config and understand its basic concepts, advantages, and disadvantages. Let's dive in with an introduction.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is AWS Config?
&lt;/h2&gt;

&lt;p&gt;AWS Config is an AWS service that allows you to audit, assess, and evaluate your AWS resource configurations. The service records and evaluates the configurations of your AWS resources against desired configurations, a set of rules, or conformance packs. It's an optimal service for cloud auditing and asset visibility.&lt;/p&gt;

&lt;p&gt;In terms of visibility, Config also enables you to view configuration histories, which streamlines change management, operational troubleshooting, and security analysis.&lt;/p&gt;

&lt;p&gt;Here's a breakdown of what Config offers for cloud auditing:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Configuration history of AWS resources and software&lt;/li&gt;
&lt;li&gt;Customizable rules&lt;/li&gt;
&lt;li&gt;Conformance packs&lt;/li&gt;
&lt;li&gt;Tracking resource relationships&lt;/li&gt;
&lt;li&gt;Configuration snapshots&lt;/li&gt;
&lt;li&gt;Governance dashboard&lt;/li&gt;
&lt;li&gt;Integrations with other AWS services&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Get started with Bite-Size Key Concepts
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;AWS Resources&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;AWS resources are entities that are created and managed within the AWS Management Console or using the AWS Command Line Interface (CLI), SDKs, or AWS partner tools. For example, Amazon EC2 instances, VPCs, and Elastic Block Store are resources. &lt;a href="https://docs.aws.amazon.com/config/latest/developerguide/resource-config-reference.html#supported-resources"&gt;See the current list of supported resource types&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration Items&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A configuration item, or CI, is a point-in-time view of a supported resource. It comprises a JSON file holding the resource configuration information, relationship information, or related metadata as a point-in-time snapshot. So, Config forms a CI every time a resource configuration change takes place. Config records directly related resources as well to ensure they aren't affected by the changed configuration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration Stream&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A configuration stream is a list of all your configuration items for the resources being recorded by Config. The list is automatically updated every time a resource is created, modified, or deleted. This configuration stream operates by using Amazon Simple Notification Service (SNS) topic. It helps to be aware whenever a change occurs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration History&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As the name gives away, a configuration history is a collection of your configuration items for a given resource over a specific time period. It enables you to understand, for example, how the resource has been configured over a period when the resource was created or what configuration changes took place at a specific time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration Snapshots&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A configuration snapshot refers to a complete, point-in-time picture of the resources that Config is recording and their configurations. Additionally, configuration snapshots can be sent to an S3 bucket.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration Recorder&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The AWS Config configuration recorder stores the configurations of supported resources as configuration items. You can start, restart, and stop the recorder at any time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Resource Relationships&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;AWS Config enables you to discover AWS resources and map their relationships. For example, you can find out if an EBS volume is attached to an EC2 instance associated with a security group.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Managed and Custom Rules&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Config offers a set of predefined rules and the ability to create custom ones. An AWS Config rule refers to your desired configuration settings for a specific resource or your entire AWS account. Once you activate a rule, Config compares resources against the conditions of a particular rule. This process can be triggered either when a change occurs or periodically based on the frequency of your choice (e.g., every 24 hours).&lt;/p&gt;

&lt;h2&gt;
  
  
  How Does AWS Config Work?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xV1GXkLA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9ypu3kjrvprxpl9der3e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xV1GXkLA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9ypu3kjrvprxpl9der3e.png" alt="how does AWS Config work" width="851" height="401"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;(Source: AWS)&lt;/p&gt;

&lt;p&gt;Once switched on, AWS Config starts discovering the supported AWS resources in your account and generates a configuration item for each resource. It also creates configuration items whenever a resource configuration changes. It records and holds the historical records of your resources from the time you start the recorder until you stop it. &lt;/p&gt;

&lt;p&gt;AWS Config keeps track of configuration changes and examines them periodically or based on rule triggers. If you use AWS Config rules, it continuously evaluates your resources and compares them against desired settings. If a resource violates a rule you set up, Config flags it as non-compliant. Subsequently, when the compliance status changes, the service delivers a notification to your Amazon SNS topic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; AWS Config's &lt;strong&gt;supported resource types&lt;/strong&gt; cover many Amazon services, including CloudFront, CloudWatch, DynamoDB, EC2, CloudTrail, Elastic Beanstalk, and Lambda Function. It provides 200+ predefined rules and custom ones with limitations.&lt;/p&gt;

&lt;h2&gt;
  
  
  Advantages AWS Config Brings
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8hnGhIuI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/q6ja3nozff6cq24w0mt7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8hnGhIuI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/q6ja3nozff6cq24w0mt7.png" alt="AWS Config advantages and disadvantages" width="880" height="462"&gt;&lt;/a&gt;&lt;br&gt;
The ultimate benefit to reap from AWS Config is the ability to discover AWS resources and track configuration changes without a doubt. In addition, we can expand on the benefits, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Continuous monitoring and recording of configuration changes across your AWS resources&lt;/li&gt;
&lt;li&gt;Change management: Ability to observe historical configuration changes&lt;/li&gt;
&lt;li&gt;Continuous cloud resource auditing and compliance assessment&lt;/li&gt;
&lt;li&gt;Operational troubleshooting with AWS CloudTrail&lt;/li&gt;
&lt;li&gt;Multi-account and multi-region data aggregation&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  AWS Config Disadvantages
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--M2mfNlW5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/et0a4cfzyb7bsbkrmiwn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--M2mfNlW5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/et0a4cfzyb7bsbkrmiwn.png" alt="AWS Config costs" width="880" height="162"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;(Source: AWS)&lt;/em&gt;&lt;br&gt;
While AWS Config is a good service to monitor AWS resources, we can also point to its disadvantages for a more accurate and objective view of the service.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The more configuration items it generates, the costlier it becomes.&lt;/li&gt;
&lt;li&gt;While it supports third-party services, the service is best for AWS resources. That means multi-cloud users and organizations that seek configuration visibility for SaaS assets will need additional tools.&lt;/li&gt;
&lt;li&gt;Config lacks full coverage for AWS services. In 2019, it supported 26 services and 72 resource types. It supports 45 AWS services and 200+ rules at the time of this writing. However, even for its own services, the coverage still falls behind what other services offer.&lt;/li&gt;
&lt;li&gt;It poses usability issues. AWS Config is a regional service; that is to say, you need to set up the service in all regions for all your AWS accounts. This translates into an excessive effort for those with a considerable number of AWS accounts. And this is only one possible situation where it would demand a lot of effort on your part.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Wrap-Up
&lt;/h2&gt;

&lt;p&gt;AWS Config is a practical service to audit AWS cloud resources and gain asset visibility, which is invaluable for organizations to avoid misconfigurations, understand and secure resources, and faster troubleshooting.&lt;/p&gt;

&lt;p&gt;Depending on your deployment size within AWS, it might be best to use Config. However, for expanding digital assets dispersed across multi-cloud environments and SaaS toolchains, you may want to replace Config with an alternative service like &lt;a href="https://www.resmo.com/"&gt;Resmo&lt;/a&gt;. It would be much more profitable in the long run. Resmo offers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.resmo.com/product/sql-query-engine"&gt;SQL querying&lt;/a&gt; across multiple clouds and SaaS resources, including many AWS Config rules, a heap of ready-to-use queries, rules, and room to create custom ones&lt;/li&gt;
&lt;li&gt;Configuration change histories in relation to who did the change, when the change occurred, the change date, etc.&lt;/li&gt;
&lt;li&gt;Collecting compliance evidence faster and using compliance packs&lt;/li&gt;
&lt;li&gt;Setting up integrations in minutes and aggregating assets with ease&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Know what needs to be detected in real-time, secure your digital landscapes. That's all! Hope you enjoyed this article. &lt;/p&gt;

</description>
      <category>beginners</category>
      <category>cloud</category>
      <category>cloudskills</category>
      <category>aws</category>
    </item>
  </channel>
</rss>
