I want to block all user access to almost all aws regions. You cant "disable" a region that is enabled by default. Also I am aware of permissions that are account level and cant be restricted regionally.
I dont want to have to add a policy like this to every user/role/group
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "*",
"Resource": "*",
"Condition": {
"StringEquals": {
"aws:RequestedRegion": [
"eu-west-1",
"eu-west-2",
"eu-west-3"
]
}
}
}
]
}
You cant nest groups. So I cant have a toplevel group I put all other groups in that has this policy.
You cant add roles to groups. So for my SAM templates for my serverless apps do I have to add this policy to all of them? They dynamically create a unique role and policy for each app (and I want to keep it that way)
Is there any way at all to enforce a policy for all users and roles in an account? I must be missing something because this seems like a pita to manage.
In Active Directory we could just apply policies at the OU/domain/site/etc level easily. It feels like a basic feature of a security and identity platform
Is there a way to apply this policy at my AWS organization level?