AWS Config tracks and manages resource configurations, ensuring compliance and security. With historical analysis and effective tracking, users can identify threats and revert changes efficiently. Though some tools need updates, its core functionalities remain central to AWS resource management.


| Product | Mindshare (%) |
|---|---|
| AWS Config | 2.1% |
| Red Hat Ansible Automation Platform | 10.5% |
| Microsoft Configuration Manager | 7.8% |
| Other | 79.6% |
AWS Config offers a pay-as-you-go pricing model. Users report paying based on the number of configuration items recorded and active AWS Config rules. Costs vary depending on the volume of resources monitored. Enterprise buyers need to evaluate their resource usage to estimate costs accurately. Some users mention that costs can accumulate quickly with high-volume environments. AWS Config provides flexibility but requires careful cost management to avoid unexpected expenses.
AWS Config serves as a crucial tool for tracking configuration changes across AWS resources. Users can log alterations, flag deviations, and auto-remediate configurations. It is essential in identifying security breaches, scanning for vulnerabilities, and maintaining change histories. Regular assessments on resources such as S3 and EC2 enhance security by monitoring potential threats and suspicious IP addresses.
What are AWS Config's key features?Organizations in finance and healthcare often implement AWS Config for stringent compliance tracking, ensuring resource configurations align with established regulations. Tech companies utilize its robust logging and remediation capabilities to protect against potential threats and maintain operational integrity, while government sectors rely on its comprehensive security features for critical infrastructure safety.
| Author info | Rating | Review Summary |
|---|---|---|
| Cloud Engineer at cloudifyops | 3.5 | I use AWS Config in my company to check resource vulnerabilities, such as S3 and EC2 instances. It helps identify suspicious IP addresses and detect affected resources during threats or attacks, enhancing our security monitoring capabilities effectively. |
| Sr Engineer at a construction company with 1,001-5,000 employees | 4.5 | We utilize AWS to host various applications and find the installation and upgrade processes efficient. However, the reboot process could be improved, as it requires planning for downtime, unlike Microsoft Azure, which handles this more robustly. |
| Security Engineer-DevSecOps at a computer software company with 51-200 employees | 4.0 | I use AWS Config to track configuration changes across resources, ensuring compliance by detecting deviations like public server exposure. Its valuable historical analysis aids in reverting malicious changes, though improved built-in tools with updated inbound rules are needed. |
| DevOps Engineer at DataMoo.AI | 4.5 | AWS Config needs to improve to meet customer requirements. No specific features are highlighted as valuable, and the review doesn't mention ROI. There are no details on previous solutions or other cloud providers considered in this review. |
| Senior security engeneer at a media company with 1,001-5,000 employees | 5.0 | I find this stable and scalable solution excellent for tracking changes and security, despite one feature’s complex setup. Customer service is good, but I wish for better configuration support when writing programming languages. |