I use the solution in my company to check the vulnerabilities for all the resources, including tools like S3, EC2 Instances, and to help us with the IP addresses of those attempting to hack into our environment. The tool is useful for checking resources and for vulnerability scanning.
Security Engineer-DevSecOps at a computer software company with 51-200 employees
Real User
Jan 16, 2024
It tracks configuration changes across all your AWS resources. Imagine it as a log of every tweak and setting alteration. This lets you build compliant policies based on desired configurations. For example, if a server gets exposed publicly, Config flags it as a deviation from your baseline, monitors it, and can even automatically fix it (auto-remediate) for you. That's the main use case, making sure our AWS setup adheres to our security and compliance standards.
Sr Engineer at a construction company with 1,001-5,000 employees
Real User
Sep 5, 2023
We use AWS solutions to host our applications, such as ClearPass and Mac applications, JEMOS, and Microsoft domain controllers. We also host DHCP on AWS.
Senior security engeneer at a media company with 1,001-5,000 employees
Real User
Top 10
Jul 19, 2022
Our primary use case for this solution is identifying data through the resources feature. This solution allows us to track changes on the platform and create a history of changes. Additionally, we use the remediation feature to ensure the safety of our information and track security breaches or exposures.
Find out what your peers are saying about Amazon Web Services (AWS), HCLSoftware , Microsoft and others in Configuration Management. Updated: March 2026.
Configuration Management ensures the consistent settings of systems, reducing the likelihood of configuration drift and enhancing system reliability. It helps in maintaining optimal system integrity and supports seamless operations across different infrastructures.Configuration Management oversees the policies and procedures for managing changes to systems and applications. It is designed to bring automation to repetitive system tasks, enabling IT teams to scale operations efficiently. This...
I use the solution in my company to check the vulnerabilities for all the resources, including tools like S3, EC2 Instances, and to help us with the IP addresses of those attempting to hack into our environment. The tool is useful for checking resources and for vulnerability scanning.
It tracks configuration changes across all your AWS resources. Imagine it as a log of every tweak and setting alteration. This lets you build compliant policies based on desired configurations. For example, if a server gets exposed publicly, Config flags it as a deviation from your baseline, monitors it, and can even automatically fix it (auto-remediate) for you. That's the main use case, making sure our AWS setup adheres to our security and compliance standards.
We use AWS solutions to host our applications, such as ClearPass and Mac applications, JEMOS, and Microsoft domain controllers. We also host DHCP on AWS.
Our primary use case for this solution is identifying data through the resources feature. This solution allows us to track changes on the platform and create a history of changes. Additionally, we use the remediation feature to ensure the safety of our information and track security breaches or exposures.