It is important to have an inventory of assets (at least at high level) of which applications are in each account, business process associated, and what type of resources they should have and significant security configurations that should be enforced. To maintain consistency on the alignment of security configurations to best practices it’s necessary to keep track of configuration changes in your assets. AWS has a service called AWS Config that monitors configuration changes, allows you to remediate undesirable configurations, or restore previous configurations thus correcting configuration deviations.
AWS Config Rules such as checking SSH or RDP ports opened to the world help strengthen the security posture significantly.
You can perform remediation actions that are based on AWS Systems Manager Automation Documents to identify, notify or correct resources that become non-compliant.
If you enabled AWS Control Tower , AWS Config will be configured automatically. AWS Security Hub security standards and AWS Firewall Manager require AWS Config to be enabled.
https://www.xmind.net/m/ACQQq3/