Learn how you can create managed AWS Config rules in AWS GovCloud (US). While AWS Config continuously tracks the configuration changes that occur among your resources, it checks whether these changes violate any of the conditions in your rules. If a resource violates a rule, AWS Config flags the resource and the rule as noncompliant.
Source code to enable this functionality is available on GitHub: github.com/aws-samples/aws-govcloud-continuous-monitoring/tree/master/managed-config-rules
Learn more about AWS GovCloud (US): aws.amazon.com/govcloud-us/
- How to create managed AWS Config rules in AWS GovCloud (US) ( Download)
- Create AWS Config Rule and apply an automatic remediation ( Download)
- AWS Custom Config Rules - Part 1 ( Download)
- How to Manage Compliance with AWS Config - AWS Training ( Download)
- How to identify unmanaged configuration changes in AWS GovCloud (US) ( Download)
- Easily Transform Compliance to Code Using AWS Config, Config Rules, and the Rules Development Kit ( Download)
- AWS Summit DC 2021: Zero to ATO with Datadog for government and AWS GovCloud (US) ( Download)
- Get Started with AWS Config rules and remediation ( Download)
- Automating NIST 800-171 Compliance in AWS GovCloud (US) ( Download)
- Introduction to AWS GovCloud (US) | AWS Public Sector ( Download)
- AWS Config: Getting Started ( Download)
- Remediate Non-Compliance Using AWS Config Rules and a Custom SSM Document ( Download)
- AWS Config: Getting Started ( Download)
- GovCloud and how its special | The Keys to AWS Optimization | S7 E4 ( Download)
- AWS Custom Config Rules --- The Configuration_Item ( Download)