This project demonstrates how AWS Config can be used to monitor, flag, and enforce compliance with organizational security and operational policies in real time. The exercises involve intentionally creating non-compliant AWS resources, observing how AWS Config detects these deviations, and then remediating them to achieve compliance.
The selected tasks cover a range of AWS governance areas, including:
Through these hands-on activities, the project showcases how AWS Config rules map to real-world cloud governance needs, providing both technical skills for setup and security awareness for cloud operations.
Rule: ec2-launch-template-imdsv2-check
Learning Outcome: Configuration Security Enforcement
AWS Instance Metadata Service (IMDS) allows applications to access instance metadata. IMDSv1 is vulnerable to SSRF attacks and should be replaced with IMDSv2, which requires a session token. AWS Config flags any EC2 Launch Template that does not require IMDSv2 as NON_COMPLIANT.
LT-IMDSv1-Allowed
(or any name you like).t2.micro
.