It tracks configuration changes across all your AWS resources. Imagine it as a log of every tweak and setting alteration. This lets you build compliant policies based on desired configurations. For example, if a server gets exposed publicly, Config flags it as a deviation from your baseline, monitors it, and can even automatically fix it (auto-remediate) for you. That's the main use case, making sure our AWS setup adheres to our security and compliance standards.
We use AWS solutions to host our applications, such as ClearPass and Mac applications, JEMOS, and Microsoft domain controllers. We also host DHCP on AWS.
Senior security engeneer at a media company with 1,001-5,000 employees
Real User
Top 20
2022-07-19T10:40:16Z
Jul 19, 2022
Our primary use case for this solution is identifying data through the resources feature. This solution allows us to track changes on the platform and create a history of changes. Additionally, we use the remediation feature to ensure the safety of our information and track security breaches or exposures.
Find out what your peers are saying about Amazon Web Services (AWS), HCLSoftware , Microsoft and others in Configuration Management. Updated: February 2025.
Configuration Management involves maintaining and managing the consistency of a product's performance, functional and physical attributes with its requirements, design, and operational information throughout its life.
Emphasizes the importance of maintaining the integrity and traceability of the configuration throughout the lifecycle of complex systems. It ensures that changes are managed in a structured manner, reducing risks and improving the quality and reliability of systems. It...
It tracks configuration changes across all your AWS resources. Imagine it as a log of every tweak and setting alteration. This lets you build compliant policies based on desired configurations. For example, if a server gets exposed publicly, Config flags it as a deviation from your baseline, monitors it, and can even automatically fix it (auto-remediate) for you. That's the main use case, making sure our AWS setup adheres to our security and compliance standards.
We use AWS solutions to host our applications, such as ClearPass and Mac applications, JEMOS, and Microsoft domain controllers. We also host DHCP on AWS.
Our primary use case for this solution is identifying data through the resources feature. This solution allows us to track changes on the platform and create a history of changes. Additionally, we use the remediation feature to ensure the safety of our information and track security breaches or exposures.