AWS Config Rules Repository

AWS Config Rules Repository

#Operations Management#Security Operations

A remediation orchestration platform that consolidates security alerts, automates triage, and streamlines the remediation process across hybrid environments.

Visit Website

AWS Community Repository of Custom Config Rules - Contributions Welcome

We welcome contributions to this repository. Below are instructions on how to leverage these rules. Please review each rule carefully and test it in your development or testing environment before integrating it into production. To get started with developing AWS Config Rules, please refer to the CONTRIBUTING.md file. Related Projects: RDK (Rule Development Kit) - https://github.com/awslabs/aws-config-rdk RDKLib (Library for Running Rules at Scale) - https://github.com/awslabs/aws-config-rdklib Config Rules Engine (Deploy and Manage Rules at Scale) - https://github.com/awslabs/aws-config-engine-for-compliance-as-code To deploy one of the Config rules from this repository, note that when rules are created using RDK, you can utilize the RDK tool to deploy the rule in your AWS account. You can identify these rules by the following two characteristics: 1) they have their own directory, and 2) there is a parameters.json file present. Using the RDK: In your working folder, run: ``` git clone https://github.com/awslabs/aws-config-rules cd python rdk deploy NAME_OF_THE_RULE ``` Manually: You can also use the sample functions provided in this repository to create Config rules that evaluate the configuration settings of your AWS resources.