Restrict data transfers across AWS Regions
We would love to hear from you. Please provide
feedback on the AWS PRA by taking a short survey |
With the exception of two AWS Identity and Access Management (IAM) roles, this service control policy denies
API calls to regional AWS services in AWS Regions other than eu-west-1
and eu-central-1
. This SCP can help prevent the creation of AWS storage
and processing services in unapproved Regions. This can help prevent personal data from
being handled by AWS services in those Regions altogether. This policy uses a
NotAction
parameter because it accounts for global
AWS services, such as IAM, and services that integrate with global
services, such as AWS Key Management Service (AWS KMS) and Amazon CloudFront. In the parameter values, you can
specify those global and other non-applicable services as exceptions. For more
information about how this policy can help protect privacy and personal data in your
organization, see AWS Organizations
in this guide.
{ "Version": "2012-10-17", "Statement": [ { "Sid": "DenyAllOutsideEU", "Effect": "Deny", "NotAction": [ "a4b:*", "acm:*", "aws-marketplace-management:*", "aws-marketplace:*", "aws-portal:*", "budgets:*", "ce:*", "chime:*", "cloudfront:*", "config:*", "cur:*", "directconnect:*", "ec2:DescribeRegions", "ec2:DescribeTransitGateways", "ec2:DescribeVpnGateways", "fms:*", "globalaccelerator:*", "health:*", "iam:*", "importexport:*", "kms:*", "mobileanalytics:*", "networkmanager:*", "organizations:*", "pricing:*", "route53:*", "route53domains:*", "route53-recovery-cluster:*", "route53-recovery-control-config:*", "route53-recovery-readiness:*", "s3:GetAccountPublic*", "s3:ListAllMyBuckets", "s3:ListMultiRegionAccessPoints", "s3:PutAccountPublic*", "shield:*", "sts:*", "support:*", "trustedadvisor:*", "waf-regional:*", "waf:*", "wafv2:*", "wellarchitected:*" ], "Resource": "*", "Condition": { "StringNotEquals": { "aws:RequestedRegion": [ "eu-central-1", "eu-west-1" ] }, "ArnNotLike": { "aws:PrincipalARN": [ "arn:aws:iam::*:role/Role1AllowedToBypassThisSCP", "arn:aws:iam::*:role/Role2AllowedToBypassThisSCP" ] } } } ] }