Posted On: Nov 19, 2018

AWS Config launches a new managed rule named cloudformation-stack-drift-detection-check that helps you evaluate whether your AWS CloudFormation stacks' actual configuration differs, or has drifted, from its expected configuration.

This rule supports the recently launched drift detection feature in AWS CloudFormation that helps you detect whether any configuration changes were made to your stack resources outside of AWS CloudFormation using the AWS Management Console, CLIs, or SDKs. The new cloudformation-stack-drift-detection-check AWS Config rule notifies you when your AWS CloudFormation stacks don’t comply with the desired state. This helps you drive consistency in your resource configurations.

The cloudformation-stack-drift-detection-check AWS Config rule is available in the following Regions: Asia Pacific (Mumbai), Asia Pacific (Seoul), Asia Pacific (Singapore), Asia Pacific (Sydney), Asia Pacific (Tokyo), Canada (Central), EU (Frankfurt), EU (Ireland), EU (London), EU (Paris), South America (São Paulo), US East (Ohio), US East (N. Virginia), US West (N. California), and US West (Oregon).

Learn more about the cloudformation-stack-drift-detection-check AWS Config rule and Drift detection in AWS CloudFormation.