Describe a strategy for using AWS Config to monitor and enforce compliance with security best practices across multiple AWS accounts. Include how you would set up AWS Config rules, what types of rules would be essential, and how you would handle non-compliant resources.