How To Perform Aws Security Scanning And Configuration Monitoring