🕳️
The Cyber Security Library
Ctrlk
  • The Library
  • Offensive Security
  • Malware
  • Vulnerability Management
  • Cloud
    • AWS
      • AWS CDK: Deploy and using amazon SQS Que from Repo
      • Using Different AWS Services with Splunk
        • AWS Config
          • How Does Config work?
          • How to enable Config
          • Settings
          • Aggregation
          • Creating Config Resource
          • Creating Aggregator
          • Adding Rules
        • CloudTrail
        • EventBridge
        • CloudWatch
        • Configuring VPC Flow Logs
        • Automating Incident Response with EventBridge
        • CloudTrail SIEM Integration (Splunk)
      • AWS DevOps EBS Volumes
      • EKS Creating a deployment with AWS in the command Line
      • How to CloudShell SSH in to ec2 Instances
    • Azure
  • Splunk
  • DevOps
  • CTF's
    • THM Wonderland
    • Healthcare OpenEMR system -THM Plotted EMR
    • Steam Cloud CTF Exploiting Kubernetes
    • THM Flatline CTF
    • Biteme CTF
    • Devoops CTF
    • GoBox CTF
    • Explore: Android Box
Powered by GitBook
On this page
  1. Cloud
  2. AWS
  3. Using Different AWS Services with Splunk
  4. AWS Config

How Does Config work?

PreviousAWS ConfigNextHow to enable Config

Last updated 2 years ago