AWS Config Remediation Configuration

This page shows how to write Terraform and CloudFormation for AWS Config Remediation Configuration and write them securely.

code-icon

Fix issues in your cloud & app configurations

Test for misconfigurations of this resource in your cloud.

get-started-button

Terraform Example (aws_config_remediation_configuration)

Provides an AWS Config Remediation Configuration.

Note: Config Remediation Configuration requires an existing Config Rule to be present.

Parameters

Example Usage (from GitHub)

github-iconmamiotsu/cloud-bankruptcy-iac
resource "aws_config_remediation_configuration" "restricted_ssh"{
  config_rule_name = aws_config_config_rule.restricted_ssh.name
  resource_type = "AWS::Config::RemediationConfiguration"
  target_type = "SSM_DOCUMENT"
  target_id = "AWS-DisablePublicAccessForSecurityGroup"

CloudFormation Example (AWS::Config::RemediationConfiguration)

An object that represents the details about the remediation configuration that includes the remediation action, parameters, and data to execute the action.

Parameters

Frequently asked questions

What is AWS Config Remediation Configuration?

AWS Config Remediation Configuration is a resource for Config of Amazon Web Service. Settings can be wrote in Terraform and CloudFormation.

Where can I find the example code for the AWS Config Remediation Configuration?

For Terraform, the mamiotsu/cloud-bankruptcy-iac source code example is useful. See the Terraform Example section for further details.