AWS Log
A command-line tool that shows configuration history and changes of AWS resources using AWS Config service.

AWS Log
A command-line tool that shows configuration history and changes of AWS resources using AWS Config service.
AWS Log Description
AWS Log is a command-line tool that displays the configuration history and changes of AWS resources over time. The tool leverages AWS Config service to retrieve historical configuration data for supported AWS resources. Key features include: - Configuration history tracking for AWS resources supported by AWS Config - Command-line interface for querying resource changes - Filtering options by resource type, date ranges, and number of history items - Support for viewing deleted resources - Context display for configuration changes - Colorized output with option to disable The tool requires proper AWS credentials configuration and AWS Config setup to record resource configuration changes. Users can query resources by name or ID and specify various parameters to customize the output, including time-based filtering and the number of historical items to display.
AWS Log FAQ
Common questions about AWS Log including features, pricing, alternatives, and user reviews.
AWS Log is A command-line tool that shows configuration history and changes of AWS resources using AWS Config service.. It is a Cloud Security solution designed to help security teams with Configuration Management, Monitoring, Infrastructure.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox