Authorizing Aggregator Accounts to Collect AWS Config Configuration and Compliance Data Using the Console - AWS Config

Authorizing Aggregator Accounts to Collect AWS Config Configuration and Compliance Data Using the Console

AWS Config allows you to authorize accounts to collect AWS Config configuration and compliance data.

On the Authorizations page, you can do the following:

  • Add Authorization to allow a specified aggregator account and Region to collect AWS Config configuration and compliance data from your current account.

  • Authorize a pending request from an aggregator account to collect AWS Config configuration and compliance data from your current account.

  • Delete an authorization for an aggregator account to collect AWS Config configuration and compliance data from your current account.

Considerations

There are two types of aggregators: Individual account aggregator and Organization aggregator

For an individual account aggregator, authorization is required for all source accounts and Regions that you want to include, including both external accounts and Regions and Organization member accounts and Regions.

For an organization aggregator, authorization is not required for Organization member account regions since authorization is integrated with the AWS Organizations service.

Aggregators do not automatically enable AWS Config on your behalf

AWS Config needs to be enabled in the source account and Region for either type of aggregator, in order for AWS Config data to be generated in the source account and Region.

Add Authorization for Aggregator Accounts and Regions

You can add authorization to grant permission to aggregator accounts and Regions to collect AWS Config configuration and compliance data.

  1. Sign in to the AWS Management Console and open the AWS Config console at https://console.aws.amazon.com/config/.

  2. Navigate to the Authorizations page and choose Add authorization.

  3. For Aggregator account, type the 12-digit account ID of an aggregator account.

  4. For Aggregator region, choose the AWS Regions where the aggregator account is allowed to collect AWS Config configuration and compliance data.

  5. Choose Add authorization to confirm your selection.

    AWS Config displays an aggregator account, Region, and authorization status.

    Note

    You can also add authorizations to aggregator accounts and Regions programatically using AWS CloudFormation sample templates. For more information, see AWS::Config::AggregationAuthorization in the AWS CloudFormation User Guide.

Authorize a Pending Request for an Aggregator Account

If you have a pending authorization request from an existing aggregator account you will see the request status on the Authorizations page. You can authorize a pending request from this page.

  1. Choose the aggregator account that you want to authorize, and then choose Authorize.

    A confirmation message is displayed to confirm that you want to grant the aggregator account permission to collect AWS Config data from this account.

  2. Choose Authorize again to confirm that you want to grant permission to the aggregator account.

    The authorization status changes from Requesting for authorization to Authorized.

Authorization approval period

Authorization approval is required to add source accounts to an individual account aggregator. A pending authorization approval request will be available for 7 days after an individual account aggregator adds a source account.

Delete Authorization for an Existing Aggregator Account

  1. Choose the aggregator account that you want to delete authorization, and then choose Delete.

    A warning message is displayed. When you delete this authorization, AWS Config data will no longer be shared with the aggregator account.

  2. Choose Delete again to confirm your selection.

    The aggregator account is now deleted.

After authorization for an aggregator is deleted the data will remain in the aggregator account for up to 24 hours before being deleted.