Our next-gen architecture is built to help you make sense of your ever-growing data. Watch a 4-min demo video!

Quick Start Security for AWS Config

AWS Config
AWS Config icon

Out-of-the-Box Security For AWS Config Includes:

Alerts - 5

Stay on top of AWS Config key performance metrics. Keep everyone in the know with integration with Slack, PagerDuty and more.

AWS Config rule added

AWS Config continuously monitors and records your AWS resource configurations. any unauthorized or unwanted modifications could harm the visibility of your AWS environment and could lead to holes in the system visibility. Impact Any unauthorized change to the monitoring of resources might indicate an attacker trying to hide the use or access of resources. Mitigation Limit the number of users authorized to make changes to config configurations. Review any change to determine if it's malicious or not. MITRE Tactic: TA0005 MITRE Technique: T1562 MITRE Sub-Technique: 001

AWS Config rule deleted

AWS Config continuously monitors and records your AWS resource configurations. any unauthorized or unwanted modifications could harm the visibility of your AWS environment and could lead to holes in the system visibility. Impact Any unauthorized change to the monitoring of resources might indicate an attacker trying to hide the use or access of resources. Mitigation Limit the number of users authorized to make changes to config configurations. Review any change to determine if it's malicious or not. MITRE Tactic: TA0005 MITRE Technique: T1562 MITRE Sub-Technique: 001

AWS Config delivery channel deleted

AWS Config continuously monitors and records your AWS resource configurations. any unauthorized or unwanted modifications could harm the visibility of your AWS environment and could lead to holes in the system visibility. Impact Any unauthorized change to the monitoring of resources might indicate an attacker trying to hide the use or access of resources. Mitigation Limit the number of users authorized to make changes to config configurations. Review any change to determine if it's malicious or not. MITRE Tactic: TA0005 MITRE Technique: T1562 MITRE Sub-Technique: 001

AWS Config configuration recorder deleted

AWS Config continuously monitors and records your AWS resource configurations. any unauthorized or unwanted modifications could harm the visibility of your AWS environment and could lead to holes in the system visibility. Impact Any unauthorized change to the monitoring of resources might indicate an attacker trying to hide the use or access of resources. Mitigation Limit the number of users authorized to make changes to config configurations. Review any change to determine if it's malicious or not. MITRE Tactic: TA0005 MITRE Technique: T1562 MITRE Sub-Technique: 001

AWS Config remediation exceptions added

AWS Config continuously monitors and records your AWS resource configurations. any unauthorized or unwanted modifications could harm the visibility of your AWS environment and could lead to holes in the system visibility. Impact Any unauthorized change to the monitoring of resources might indicate an attacker trying to hide the use or access of resources. Mitigation Limit the number of users authorized to make changes to config configurations. Review any change to determine if it's malicious or not. MITRE Tactic: TA0005 MITRE Technique: T1562 MITRE Sub-Technique: 001

Documentation

Learn more about Coralogix's out-of-the-box integration with AWS Config in our documentation.

Read More
Schedule Demo