AWS Config Just Added 30 Resource Types. The Bedrock AgentCore Ones Matter Most.

AWS Config Just Added 30 Resource Types. The Bedrock AgentCore Ones Matter Most.

Table of Contents

AWS quietly announced support for 30 new resource types in AWS Config on March 2, 2026. If you’re the kind of person who skims these announcements and moves on, I get it. Most Config resource type expansions are incremental. This one isn’t.

Buried in the list of DataBrew datasets and GameLift fleets are two resource types that should make anyone deploying AI agents sit up straight: AWS::BedrockAgentCore::Gateway and AWS::BedrockAgentCore::Memory.

If you’ve been following my writing on Config, you know I think it’s one of the most underused services in AWS. And if you’ve been following my coverage of Bedrock AgentCore and the governance gap in AI agent deployments, this is the announcement that ties those two threads together.

Why AgentCore in Config Changes the Game

Let’s be direct about what these two new resource types mean.

AWS::BedrockAgentCore::Gateway

AgentCore Gateways are the front door to your AI agents. They handle request routing, authentication, and traffic management for agent deployments. Until now, if you wanted to know whether someone had modified a gateway configuration, added a new route, or changed authentication settings, you were relying on CloudTrail events and hoping you’d written the right EventBridge rules to catch changes.

Now Config tracks gateway state continuously. That means:

  • Configuration drift detection — You can write Config rules that alert when a gateway’s authentication settings deviate from your baseline. If someone disables auth on a production gateway, you’ll know.
  • Historical configuration — Config’s timeline view lets you see exactly what a gateway looked like at any point in time. When an agent starts behaving unexpectedly after a deployment, you can compare the current gateway config against the version that was working.
  • Cross-account aggregation — If you’re running AgentCore across multiple accounts (and you should be separating production from development), Config Aggregators now give you a single pane of glass across all your agent gateways.

AWS::BedrockAgentCore::Memory

This is the one that really matters for governance. AgentCore Memory is how agents maintain context across sessions — conversation history, user preferences, retrieved knowledge, tool execution results. It’s the component that makes agents feel “intelligent” rather than stateless.

It’s also the component that, if misconfigured, could expose sensitive data across sessions, persist PII longer than your retention policies allow, or leak context between users.

Having Memory tracked in Config means you can now:

  • Audit memory configuration changes — Who changed the retention policy? When? What was it before?
  • Enforce compliance rules — Write custom Config rules that flag any Memory configuration without encryption at rest, or with retention periods exceeding your data governance requirements.
  • Inventory at scale — How many Memory configurations exist across your organisation? Which accounts are running agents with persistent memory? Config Aggregators answer this in seconds.

I wrote about the policy and evaluation controls that AgentCore introduced in December. Those were the “what should agents be allowed to do” controls. Config support is the “can we prove they’re configured correctly” control. They’re complementary, and you need both. If you’re using n8n to prototype agent logic before deploying to AgentCore, Config is what gives you governance visibility once you go to production.

The Full List

Here are all 30 new resource types, grouped by service:

AI & Machine Learning

Resource TypeWhat It Tracks
AWS::Bedrock::DataSourceKnowledge base data source configurations — where your agents pull their context from
AWS::BedrockAgentCore::GatewayAgent gateway routing, auth, and traffic configuration
AWS::BedrockAgentCore::MemoryAgent session memory and context persistence settings

Identity & Access

Resource TypeWhat It Tracks
AWS::Cognito::IdentityPoolRoleAttachmentWhich IAM roles are mapped to identity pool auth/unauth users
AWS::Cognito::LogDeliveryConfigurationWhere Cognito sends its logs (or whether it’s logging at all)
AWS::Cognito::UserPoolUICustomizationAttachmentCustom branding on hosted UI — less critical for security, but useful for config drift
AWS::VerifiedPermissions::IdentitySourceCedar policy identity sources — the bridge between Cognito and fine-grained authorization

Data & Analytics

Resource TypeWhat It Tracks
AWS::AppSync::DataSourceGraphQL API data source connections
AWS::DataBrew::DatasetData preparation dataset definitions
AWS::DataBrew::JobData transformation job configurations
AWS::DataBrew::ProjectDataBrew project settings
AWS::DataBrew::RecipeData transformation recipes
AWS::DataBrew::RulesetData quality rule definitions
AWS::DataBrew::ScheduleAutomated job schedules
AWS::Omics::ReferenceStoreGenomic reference data store configurations

Infrastructure & Compute

Resource TypeWhat It Tracks
AWS::Batch::ConsumableResourceBatch compute consumable resource definitions
AWS::GameLift::ContainerFleetContainer-based game server fleet configurations
AWS::GameLift::ContainerGroupDefinitionContainer group settings for GameLift
AWS::GameLift::GameServerGroupGame server group auto-scaling settings
AWS::GameLift::LocationCustom GameLift location definitions
AWS::Deadline::LicenseEndpointRender farm license server endpoints
AWS::Deadline::QueueEnvironmentRender queue environment configurations

Networking & IoT

Resource TypeWhat It Tracks
AWS::Connect::RoutingProfileContact center agent routing configurations
AWS::IoT::TopicRuleIoT message routing rules

Security & Governance

Resource TypeWhat It Tracks
AWS::Detective::OrganizationAdminDelegated admin for Detective across the organisation
AWS::PCAConnectorAD::TemplatePrivate CA certificate templates for Active Directory
AWS::PCAConnectorSCEP::ChallengeSCEP challenge configurations for device certificates
AWS::ResourceExplorer2::ViewResource Explorer saved views and filters
AWS::ResourceGroups::GroupResource group membership and tag-based groupings
AWS::Scheduler::ScheduleGroupEventBridge Scheduler group configurations

What I’d Do With This

If you’re running Bedrock AgentCore in any capacity, here’s the immediate action list:

  1. Enable Config recording for the three Bedrock resource types if you haven’t already. Config should be recording all supported resource types by default, but if you’re using selective recording, add these explicitly.

  2. Write a custom Config rule that checks AWS::BedrockAgentCore::Memory for encryption-at-rest and maximum retention period. If you’ve been following the Config + cfn-guard approach I covered previously, you already have the pattern for this.

  3. Add these to your Config Aggregator queries. If you’re using advanced queries (and you should be — I wrote about why Config’s query capability is so underrated), you can now run SQL-like queries across all your agent infrastructure in seconds.

  4. Set up a Security Hub integration. Security Hub’s support for custom Config rules means you can feed AgentCore compliance findings directly into your security dashboard alongside everything else.

The Cognito additions are also worth calling out. If you’re using Cognito for user authentication (and a lot of AWS shops are), having IdentityPoolRoleAttachment in Config means you can finally track when someone changes which IAM roles get attached to your identity pools. That’s been a blind spot for a while.

The Bigger Picture

AWS has been steadily expanding Config’s resource coverage, but the addition of AI service resource types signals something important: the compliance and governance tooling is catching up with the pace of AI service adoption.

Six months ago, you could deploy an AgentCore gateway and memory configuration with essentially no configuration management visibility. Now you have the same continuous compliance controls you’d expect for an EC2 instance or an S3 bucket. The AWS MCP strategy guide reinforces this: governance isn’t just a compliance checkbox, it measurably improves agent accuracy by 28-32%.

That’s how it should work. The infrastructure governance story shouldn’t have gaps just because the technology is new. If you’ve been following the Config Conundrum I wrote about years ago, you’ll know this has been a recurring theme — the gap between what AWS ships and what Config can actually track.

That gap just got 30 resource types smaller.

Share :

Related Posts

How to use cfn-guard with AWS Config

How to use cfn-guard with AWS Config

I’m not sure when but AWS Config now supports using Guard rules to determine the compliance of resources. This is a pretty neat integration and one of the first I’ve seen from AWS on a side Open Source Project they have created.

Read More
AWS Bedrock AgentCore Policy & Evaluations: AI Agent Governance at Scale

AWS Bedrock AgentCore Policy & Evaluations: AI Agent Governance at Scale

Many organisations are rushing into deploying AI agents with the same enthusiasm they had for serverless in 2016, great technology, terrible operational discipline. The pattern is predictable: build a proof-of-concept that works brilliantly in a demo, deploy it cautiously to production, then discover you have no idea how to govern what it’s actually doing once users interact with it at scale.

Read More
AWS Bedrock AgentCore Starter Toolkit: Deploy AI Agents in 3 Commands

AWS Bedrock AgentCore Starter Toolkit: Deploy AI Agents in 3 Commands

Let’s be honest. The most exciting part of building an AI agent is the agent itself—the logic, the prompts, the creative problem-solving. The least exciting part? The ceremony. The boilerplate. The tedious dance of wrapping our code in an API, writing a Dockerfile, managing ECR repositories, and wrestling with deployment scripts to get our creation into the cloud.

Read More