It tracks configuration changes across all your AWS resources. Imagine it as a log of every tweak and setting alteration. This lets you build compliant policies based on desired configurations. For example, if a server gets exposed publicly, Config flags it as a deviation from your baseline, monitors it, and can even automatically fix it (auto-remediate) for you. That's the main use case, making sure our AWS setup adheres to our security and compliance standards.
We use AWS solutions to host our applications, such as ClearPass and Mac applications, JEMOS, and Microsoft domain controllers. We also host DHCP on AWS.
Senior security engeneer at a media company with 1,001-5,000 employees
Real User
Top 20
2022-07-19T10:40:16Z
Jul 19, 2022
Our primary use case for this solution is identifying data through the resources feature. This solution allows us to track changes on the platform and create a history of changes. Additionally, we use the remediation feature to ensure the safety of our information and track security breaches or exposures.
Find out what your peers are saying about Amazon Web Services (AWS), HCLSoftware , Microsoft and others in Configuration Management. Updated: October 2024.
Configuration Management streamlines the process of maintaining consistency of a product's performance and functional attributes, ensuring optimal operations and adaptability.
Implementing Configuration Management enhances control over developing, updating, and deploying software applications. It ensures that all environments are standardized across the development lifecycle, reducing errors and downtime. This approach assists with compliance, documentation, and easier rollback...
It tracks configuration changes across all your AWS resources. Imagine it as a log of every tweak and setting alteration. This lets you build compliant policies based on desired configurations. For example, if a server gets exposed publicly, Config flags it as a deviation from your baseline, monitors it, and can even automatically fix it (auto-remediate) for you. That's the main use case, making sure our AWS setup adheres to our security and compliance standards.
We use AWS solutions to host our applications, such as ClearPass and Mac applications, JEMOS, and Microsoft domain controllers. We also host DHCP on AWS.
Our primary use case for this solution is identifying data through the resources feature. This solution allows us to track changes on the platform and create a history of changes. Additionally, we use the remediation feature to ensure the safety of our information and track security breaches or exposures.