Skip to main content

Disabling Services

One-Click Least Privilege. Zero Disruption.



© 2025 Sonrai Security. All rights reserved.

Overview

Disabling service(s) can be regarded as a quick and simple method of reducing attack surface to lower the overall level of service-related risk(s) for your cloud.

tip

*Before you read on for information on implementing service blocks, we recommend you first review the Services page to understand key terms/concepts

warning

Disabling a service will make the service unusable for the scope selected - even exempted identities will not be able to use it!

Reference: Click these links for more information on the Slack / Teams ChatOps pages.


Scope it Out

Focus Org-wide

Keeping your scope set to the top-level Org-wide view allows you to make changes most efficiently as said changes will propagate down to the child OUs/Accounts.

tip

If your Org is fairly large, it likely makes more sense to review the next tab on scoping to singular OU(s)/Account(s).


Filter for Unprotected Services

Now you have a clear view of what Services are considered protected in context of either a specific account or your entire organization.

Continue on by filtering the "Service Status" by "Unprotected" and remediate those first to make the most impact.


Implementing a Service Block

Disable Unused Services

When a service remains enabled, but unused, it provides an avenue for lateral movement in the case of a breach.

Scenario

"We were testing out AWS Certificate Manager (CA) for an application, but have decided to use an alternate CA."

Action

It looks like someone forgot to disable the service after testing was completed.

To remediate, click "Disable" then navigate to the "Pending Changes" page.

Disable Unauthorized Services

As an example, when a service remains enabled it can be tempting for members of your organization to use it without following change management process(es), for example. This can lead to violations of customer-related requirements (Example: think GDPR), additional unexpected costs, etc.

Scenario

"Something in one of our AWS Accounts is using API Gateway Execute which isn't on our list of authorized AWS services..."

Action

In this case, you may want to disable the entire service to ensure no identities within your organization can use it, since it isn't an authorized service for use.

caution

Before putting the service block in place [in this kind of scenario], we highly recommend checking in with the owner of the AWS Account/identity first to ensure the service in question is not used for an integral part of your production/customer-facing infrastructure


Review Your Changes

Now that you've scoped your view and chosen to block usage for a service entirely (either for your entire Organization or specific AWS Account(s)), click on the confirmation modal to transfer the changes to the "Pending Changes" page for review.

Reference: See here for more information on the "Pending Changes" page.