I use the solution in my company to check the vulnerabilities for all the resources, including tools like S3, EC2 Instances, and to help us with the IP addresses of those attempting to hack into our environment. The tool is useful for checking resources and for vulnerability scanning.
It tracks configuration changes across all your AWS resources. Imagine it as a log of every tweak and setting alteration. This lets you build compliant policies based on desired configurations. For example, if a server gets exposed publicly, Config flags it as a deviation from your baseline, monitors it, and can even automatically fix it (auto-remediate) for you. That's the main use case, making sure our AWS setup adheres to our security and compliance standards.
We use AWS solutions to host our applications, such as ClearPass and Mac applications, JEMOS, and Microsoft domain controllers. We also host DHCP on AWS.
Senior security engeneer at a media company with 1,001-5,000 employees
Real User
Top 20
2022-07-19T10:40:16Z
Jul 19, 2022
Our primary use case for this solution is identifying data through the resources feature. This solution allows us to track changes on the platform and create a history of changes. Additionally, we use the remediation feature to ensure the safety of our information and track security breaches or exposures.
Find out what your peers are saying about Amazon Web Services (AWS), HCLSoftware , Microsoft and others in Configuration Management. Updated: July 2025.
Configuration Management ensures consistent performance by managing system settings across the network. It enhances efficiency, reduces downtime, and improves compliance with industry standards.Configuration Management provides a systematic approach to handle IT resources. This involves tracking all aspects of hardware and software configurations, identifying any discrepancies, and rectifying them efficiently. Effective Configuration Management aids IT teams in maintaining control over...
I use the solution in my company to check the vulnerabilities for all the resources, including tools like S3, EC2 Instances, and to help us with the IP addresses of those attempting to hack into our environment. The tool is useful for checking resources and for vulnerability scanning.
It tracks configuration changes across all your AWS resources. Imagine it as a log of every tweak and setting alteration. This lets you build compliant policies based on desired configurations. For example, if a server gets exposed publicly, Config flags it as a deviation from your baseline, monitors it, and can even automatically fix it (auto-remediate) for you. That's the main use case, making sure our AWS setup adheres to our security and compliance standards.
We use AWS solutions to host our applications, such as ClearPass and Mac applications, JEMOS, and Microsoft domain controllers. We also host DHCP on AWS.
Our primary use case for this solution is identifying data through the resources feature. This solution allows us to track changes on the platform and create a history of changes. Additionally, we use the remediation feature to ensure the safety of our information and track security breaches or exposures.