Skip to main content

Regions

One-Click Least Privilege. Zero Disruption.



© 2025 Sonrai Security. All rights reserved.

Overview

Regions can be subject to cloud-wide control block that removes the ability for any cloud activity/usage within one or more regions (i.e. ca-central-1, etc.). This control is commonly used by many organizations that want to limit cloud sprawl and focus their teams on the regions in which they operate.

warning

Identity exemptions DO NOT APPLY for any scope for services within a disabled region.

Regions can be disabled using either the AWS console or the Cloud Permissions Firewall.

tip

Best practice: Manually audit regions before disabling to ensure there are no active/enabled resources, as you will not be able to modify/manage them once disabled!


Examples

Example 1: When Outsiders Become Insiders

One day, a sophisticated attacker discovered that a business had several AWS regions enabled but not actively managed. Sensing an opportunity, the attacker began probing these unused regions for vulnerabilities. In one of these regions, the attacker found an old, unpatched service that had been inadvertently deployed during a testing phase and was never decommissioned!

Exploiting the outdated service, the attacker gained a foothold in the AWS environment through the unused region's resources. With this initial access, the attacker began exploring the company's global cloud infrastructure. They found that some of the IAM (Identity and Access Management) policies applied globally, allowing them to escalate their privileges and access resources in the active regions.

Once inside, the attacker managed to access sensitive customer data, including personal information and purchase histories (PII!). They exfiltrated this data and modified several logs and configurations to make detection/forensic timeline mapping more difficult.


Region Statuses

Key terms and concepts for each possible status you may encounter in the Regions card:

Enabled

All accounts/identities [at any scope] are allowed to use this region

(i.e. you have not disabled this region [at any scope] through either the AWS console or Sonrai's Cloud Permissions Firewall yet)

Disabled

This region is disabled for all accounts/identities

(i.e the service cannot be used at all, even by exempted identities)

Partially Enabled

Some accounts/identities [in scope] are allowed to use the region


Example: There are 2 AWS accounts involved and these combined enabled/disabled Region statuses contribute to the determination of "Partially Enabled" in the Cloud Permissions Firewall:

account1 region is enabled in AWS


Enabled in the Sonrai Cloud Permissions Firewall
AND
account2 region is disabled in AWS
Partially Disabled

Some accounts/identities [in scope] are NOT allowed to use the region


Example: There are 2 AWS accounts involved and these enabled/disabled Region statuses contribute to the determination of "Partially Disabled" in the Cloud Permissions Firewall:

account1 region is enabled in AWS


Enabled in the Sonrai Cloud Permissions Firewall
AND
account2 region is enabled in AWS


Disabled in the Sonrai Cloud Permissions Firewall


tip

Any status with "(pending)" indicates there are entries within the Pending Changes page to review/action


Disabling Regions

At your chosen scope (Org/OU/Account), click to review the available regions map/list:

Once a region is selected, click within the region row and in the resulting confirmation window:

This will send your changes to the Pending Changes page to be reviewed and further actioned/deployed:

In this scenario with the Organization scope selected, the status of the region will change to "Disabled (pending)", then "Disabled" (once all Pending Changes are deployed to your cloud).

tip

See our Pending Changes documentation for more information!


Enabling Regions

If a region is enable within the AWS console, you can keep it enabled (or re-enable it) with the Cloud Permissions Firewall, as needed.

warning

If a region is disabled within the AWS console, you will NOT be able to enable it using the Cloud Permissions Firewall.


Regions FAQ

Will I need to manually audit and disable new regions introduced by AWS?

No! New regions are disabled by default by AWS & therefore Cloud Permissions Firewall.


What do regions with the lock symbol mean?

Regions with a lock icon are considered core AWS regions and cannot be disabled at any scope.

  • US West (Oregon)
  • US East (N. Virginia)