🕳️
The Cyber Security Library
Ctrlk
  • The Library
  • Offensive Security
  • Malware
  • Vulnerability Management
  • Cloud
    • AWS
      • AWS CDK: Deploy and using amazon SQS Que from Repo
      • Using Different AWS Services with Splunk
        • AWS Config
          • How Does Config work?
          • How to enable Config
          • Settings
          • Aggregation
          • Creating Config Resource
          • Creating Aggregator
          • Adding Rules
        • CloudTrail
        • EventBridge
        • CloudWatch
        • Configuring VPC Flow Logs
        • Automating Incident Response with EventBridge
        • CloudTrail SIEM Integration (Splunk)
      • AWS DevOps EBS Volumes
      • EKS Creating a deployment with AWS in the command Line
      • How to CloudShell SSH in to ec2 Instances
    • Azure
  • Splunk
  • DevOps
  • CTF's
    • THM Wonderland
    • Healthcare OpenEMR system -THM Plotted EMR
    • Steam Cloud CTF Exploiting Kubernetes
    • THM Flatline CTF
    • Biteme CTF
    • Devoops CTF
    • GoBox CTF
    • Explore: Android Box
Powered by GitBook
On this page
  1. Cloud
  2. AWS
  3. Using Different AWS Services with Splunk
  4. AWS Config

Creating Aggregator

PreviousCreating Config ResourceNextAdding Rules

Last updated 2 years ago