Ensure that AWS Config Aggregator is configured and its sources are successfully collecting configuration and compliance data from all accounts and regions within your AWS cloud environment. An aggregator is an AWS Config resource type that collects configuration and compliance data from multiple source accounts and regions, or from an organization in AWS Organizations. The DescribeConfigurationAggregatorSourcesStatus API returns status information for each source within an aggregator, including the LastUpdateStatus which can be SUCCEEDED, FAILED, or OUTDATED. A source with a FAILED or OUTDATED status indicates that the aggregator is not receiving up-to-date data from that source, potentially due to authorization issues, disabled AWS Config in the source account, or network connectivity problems.
This rule can help you work with the AWS Well-Architected Framework.
excellence
Monitoring the health of AWS Config Aggregator sources is critical for maintaining a complete and accurate view of your multi-account, multi-region cloud environment. When aggregator sources report a FAILED or OUTDATED status, the centralized compliance and configuration data becomes incomplete, which can lead to blind spots in your security posture, missed compliance violations, and inaccurate reporting during audits. Ensuring that all aggregator sources are successfully collecting data allows your operations and security teams to rely on the aggregated view for compliance monitoring, change tracking, and resource relationship analysis across your entire AWS organization.
Audit
To determine if AWS Config Aggregator sources are successfully collecting data, perform the following operations:
Remediation / Resolution
To ensure that AWS Config Aggregator sources are successfully collecting configuration and compliance data, perform the following operations:
Note: Aggregator source failures are typically caused by missing authorization in source accounts, AWS Config not being enabled in the source account or region, or IAM permission issues. The remediation steps below cover the most common scenarios. Ensure that AWS Config is enabled in all source accounts and regions before proceeding (see the Config-001 rule for enabling AWS Config).References
- AWS Documentation
- Multi-Account Multi-Region Data Aggregation for AWS Config
- Viewing Compliance and Inventory Data in the Aggregator Dashboard for AWS Config
- DescribeConfigurationAggregatorSourcesStatus
- DescribeConfigurationAggregators
- AWS Command Line Interface (CLI) Documentation
- describe-configuration-aggregators
- describe-configuration-aggregator-sources-status
- put-configuration-aggregator
- put-aggregation-authorization
- CloudFormation Documentation
- AWS::Config::ConfigurationAggregator
- AWS::Config::AggregationAuthorization
- Terraform Documentation
- Resource: aws_config_configuration_aggregator
- Resource: aws_config_aggregate_authorization