Who created this EC2 Instance? Who deleted my RDS? When did this user last logged into the AWS Console and what activities were performed during that time? Answers to many such questions about AWS resources changes, user activity etc is answered by AWS service, CloudTrail.
Treat all your information in the cloud like someone is trying to steal the data. Encrypt data at all times during Transport and Rest (storage). Encryption of data at Rest is done using Encryption Keys and Algorithms.
AWS Config is a nifty service that helps manage the changes to the cloud resources.
Config enables the auditing of the AWS resources configurations. Config continuously monitors and records AWS resource configurations and automates the…