Skip to main content

Regions

One-Click Least Privilege. Zero Disruption.



© 2026 Sonrai Security. All rights reserved.

Overview

Regions can be subject to cloud-wide control block that removes the ability for any cloud activity/usage within one or more regions (i.e. ca-central-1, etc.). This control is commonly used by many organizations that want to limit cloud sprawl and focus their teams on the regions in which they operate.

warning

Identity exemptions DO NOT APPLY for any scope for services within a disabled region.

Regions can be disabled using either the AWS console or the Cloud Permissions Firewall.

tip

Best practice: Manually audit regions before disabling to ensure there are no active/enabled resources, as you will not be able to modify/manage them once disabled!


Examples

Example 1: When Outsiders Become Insiders

One day, a sophisticated attacker discovered that a business had several AWS regions enabled but not actively managed. Sensing an opportunity, the attacker began probing these unused regions for vulnerabilities. In one of these regions, the attacker found an old, unpatched service that had been inadvertently deployed during a testing phase and was never decommissioned!

Exploiting the outdated service, the attacker gained a foothold in the AWS environment through the unused region's resources. With this initial access, the attacker began exploring the company's global cloud infrastructure. They found that some of the IAM (Identity and Access Management) policies applied globally, allowing them to escalate their privileges and access resources in the active regions.

Once inside, the attacker managed to access sensitive customer data, including personal information and purchase histories (PII!). They exfiltrated this data and modified several logs and configurations to make detection/forensic timeline mapping more difficult.


Region Statuses

Key terms and concepts for each possible status you may encounter in the Regions card:

Enabled

All accounts/identities [at any scope] are allowed to use this region

(i.e. you have not disabled this region [at any scope] through either the AWS console or Sonrai's Cloud Permissions Firewall yet)

Disabled

This region is disabled for all accounts/identities

(i.e the service cannot be used at all, even by exempted identities)

Partially Enabled

Some accounts/identities [in scope] are allowed to use the region


Example: There are 2 AWS accounts involved and these combined enabled/disabled Region statuses contribute to the determination of "Partially Enabled" in the Cloud Permissions Firewall:

AWS Logo account1 region is enabled in AWS


AWS Logo Enabled in the Sonrai Cloud Permissions Firewall
AND
AWS Logo account2 region is disabled in AWS
Partially Disabled

Some accounts/identities [in scope] are NOT allowed to use the region


Example: There are 2 AWS accounts involved and these enabled/disabled Region statuses contribute to the determination of "Partially Disabled" in the Cloud Permissions Firewall:

AWS Logo account1 region is enabled in AWS


AWS Logo Enabled in the Sonrai Cloud Permissions Firewall
AND
AWS Logo account2 region is enabled in AWS


AWS Logo Disabled in the Sonrai Cloud Permissions Firewall


tip

Any status with "(pending)" indicates there are entries within the Pending Changes page to review/action


Disabling Regions

At your chosen scope (Org/OU/Account), click to review the available regions map/list:

Once a region is selected, click within the region row and in the resulting confirmation window:

[AI GENERATED] Cloud Permissions Firewall regions list with a region row selected and the Disable confirmation window open[AI GENERATED] Cloud Permissions Firewall regions list with a region row selected and the Disable confirmation window open

This will send your changes to the Pending Changes page to be reviewed and further actioned/deployed:

[AI GENERATED] Cloud Permissions Firewall Pending Changes page showing a staged region disable change awaiting review and deployment[AI GENERATED] Cloud Permissions Firewall Pending Changes page showing a staged region disable change awaiting review and deployment

In this scenario with the Organization scope selected, the status of the region will change to "Disabled (pending)", then "Disabled" (once all Pending Changes are deployed to your cloud).

[AI GENERATED] Cloud Permissions Firewall regions list showing a region with Disabled (pending) status at Organization scope[AI GENERATED] Cloud Permissions Firewall regions list showing a region with Disabled (pending) status at Organization scope
tip

See our Pending Changes documentation for more information!


Enabling Regions

If a region is enable within the AWS console, you can keep it enabled (or re-enable it) with the Cloud Permissions Firewall, as needed.

[AI GENERATED] Cloud Permissions Firewall regions list showing an enabled region with the option to enable or manage it[AI GENERATED] Cloud Permissions Firewall regions list showing an enabled region with the option to enable or manage it
warning

If a region is disabled within the AWS console, you will NOT be able to enable it using the Cloud Permissions Firewall.


Regions FAQ

Will I need to manually audit and disable new regions introduced by AWS?

No! New regions are disabled by default by AWS & therefore Cloud Permissions Firewall.


What do regions with the lock symbol mean?

Regions with a lock icon are considered core AWS regions and cannot be disabled at any scope.

  • US West (Oregon)
  • US East (N. Virginia)