After moving all IT operations to AWS, a company notices that users are launching unnecessarily large EC2 instances and making unauthorized changes to security group rules. These actions bypass the established change management process. A solutions architect needs to design a strategy that enables the company to track resource configurations and audit user activity. What actions should the solutions architect take to meet these goals?