1 Answers
Hi Hadi
Great question! It’s certainly a good idea to set up alerting for various areas of governance including regions. I would be proactive for accounts which need to be locked down to specific regions and use a combination of IAM policies and service limits. If you raise a support request with AWS they will be able to set limits to zero for key services in regions where you mustn’t deploy resources. In addition you can create some policies which deny access to all services where they are in given regions. For example:
{ "Effect": "Deny", "Action": "*", "Resource": "*", "Condition": { "StringNotEquals": { "aws:RequestedRegion": [ "us-east-1" ] } } }
the above snippet will allow you to deny access to perform API calls outside of us-east-1. This in combination with service limits in all other regions would be a good way to lock the accounts down.
You can also use CloudFormation StackSets to deploy CloudTrail and Config in all regions. An aggregated view of all accounts and all regions would also let you detect resources in unauthorised regions. Config would help you detect the presence of the resource, whereas CloudTrail would be the service you’d want to use to see who actually created the resource.
Let me know if you think of any other good ways to implement these kinds of controls :c)
Ah! I think that answer is it when you said CloudTrail would be the service to use to see who created the resource. Thank you!