Skip to main content

How to Find AWS Config is not enabled in all Regions

Problem

The AWS configuration item history captured by AWS Config enables security analysis, resource change tracking and compliance auditing.

info

This security check is part of the CIS Amazon Web Services Benchmarks and is rated severity medium.

Prerequisites

This guide assumes that you have already installed and configured Resoto to collect your AWS cloud resources.

Directions

  1. Execute the following search command in Resoto Shell or Resoto UI:

    > search is(aws_region) with(empty, --> is(aws_config_recorder) and recorder_status.recording=true and recorder_group.all_supported=true and recorder_status.last_status=SUCCESS)
    ​kind=aws_region, ..., region=resoto-poweruser
    ​kind=aws_region, ..., account=poweruser-team
  2. Pipe the search command into the dump command:

    > search is(aws_region) with(empty, --> is(aws_config_recorder) and recorder_status.recording=true and recorder_group.all_supported=true and recorder_status.last_status=SUCCESS) | dump
    ​reported:
    ​ id: /aws/config/123
    ​ name: some-name
    ​ ctime: '2022-12-05T22:53:14Z'
    ​ kind: aws_region
    ​ age: 2mo28d

    The command output will list the details of all non-compliant aws_region resources.

  3. Fix detected issues by following the remediation steps:

    Enable AWS Config be enabled in all regions.

    note

    Please refer to the AWS Config documentation for details.

Further Reading