by John Lukach
Amazon Web Services (AWS) has seventeen regions enabled by default that require protection.
It is possible to use a Service Control Policy (SCP) that can deny access to specific AWS Regions.
The caveat is that SCPs can not be applied to the AWS Management Account, leaving 17 active regions to protect. Traditionally, I had to have an Amazon GuardDuty account with matching active regions for delegated administration to limit deployments to the root account.
AWS Security Hub allows the aggregation of GuardDuty alerts from the management account even when delegated administration is enabled and regions are blocked.
With this approach, I can keep my account pattern consistent by only enabling GuardDuty in the Management Account for unused regions. The Security Hub integration should automatically start for GuardDuty but sometimes needs manual intervention to accept the findings.
In active regions, I still use delegated administration of GuardDuty to the centralized Security account.
tags: AWS - ControlTower - GuardDuty - SecurityHub