Deploying Changes in AWS
One-Click Least Privilege. Zero Disruption.

© 2026 Sonrai Security. All rights reserved.
Overview
Once you have reviewed your Pending Changes, it's time to deploy those changes in your AWS Org through a method of your choosing:
- AWS console
- Terraform
- etc.
tip
See below for help with drift detection & remediation through your IaC template(s)!
Deploying Your Changes
AWS Console
-
Log in to your AWS Master/Organization Account & navigate to CloudFormation
-
Click
-
Upload the CloudFormation template downloaded from Sonrai's Cloud Permissions Firewall
![[AI GENERATED] The AWS CloudFormation 'Create Stack' page showing the option to upload the CloudFormation template downloaded from Sonrai's Cloud Permissions Firewall.](/cpf-public/img/cpf/permissions-firewall/pending-changes/deploying-changes/5A4B17E1-D881-4773-8533-4A151AE60DFB.png)
- Provide the stack a name of your choosing
![[AI GENERATED] The AWS CloudFormation 'Specify stack details' page showing the stack name input field.](/cpf-public/img/cpf/permissions-firewall/pending-changes/deploying-changes/B06E39ED-2754-4D5E-A9C0-E6C5CF0ABBCB.png)
- Click , making no changes
![[AI GENERATED] The AWS CloudFormation 'Configure stack options' page showing no changes are required before clicking Next.](/cpf-public/img/cpf/permissions-firewall/pending-changes/deploying-changes/00019887-FBEA-44F0-9B03-9380143036CD.png)
- Review and create, clicking (making no further changes)
![[AI GENERATED] The AWS CloudFormation 'Review' page showing the stack configuration summary before clicking Submit.](/cpf-public/img/cpf/permissions-firewall/pending-changes/deploying-changes/4648B028-9DE1-4A64-9BF9-7B19A1E43CC8.png)
![[AI GENERATED] The AWS CloudFormation review page showing the acknowledgment checkbox and Submit button to create the stack.](/cpf-public/img/cpf/permissions-firewall/pending-changes/deploying-changes/952C1E52-C623-47AA-BBDC-528E2AFA0967.png)
- Review the newly created stack & policies
![[AI GENERATED] The AWS CloudFormation stack detail view showing the newly created stack and its status after deployment.](/cpf-public/img/cpf/permissions-firewall/pending-changes/deploying-changes/BAB3376B-785B-4226-BFD6-1BF55F4084CE.png)
![[AI GENERATED] The AWS CloudFormation stack resources view showing the policies created by the deployed Cloud Permissions Firewall stack.](/cpf-public/img/cpf/permissions-firewall/pending-changes/deploying-changes/51C22182-9233-4052-8418-03D352BEBF38.png)
Terraform
To ensure cohesion between the Cloud Permissions Firewall and Terraform, include the below ignore_tags block in your AWS provider configuration(s) file(s):
ignore_tags {
keys = ["cpf", "cpf-z"]
}
![[AI GENERATED] A Terraform AWS provider configuration file showing the ignore_tags block with the cpf and cpf-z tag keys to prevent IaC tag drift caused by Cloud Permissions Firewall.](/cpf-public/img/cpf/permissions-firewall/pending-changes/deploying-changes/BE9D3D36-293D-49C3-8C0C-B58A8BC49262.png)
Reference: See here for more information on Terraform ignore tags.