Table: aws_region - Query AWS Region using SQL
The AWS Region is a geographical area that represents a physical location around the world where AWS clusters data centers. Each AWS Region is designed to be completely isolated from the other AWS Regions, which aids in achieving the greatest possible fault tolerance and stability. This isolation ensures that user data is not replicated between AWS Regions unless explicitly done so by the user.
Table Usage Guide
The aws_region
table in Steampipe provides you with information about regions within AWS. This table allows you, as a DevOps engineer, to query region-specific details, including the region name, description, and status. You can utilize this table to gather insights on regions, such as their geographical distribution, operational status, and more. The schema outlines the various attributes of the AWS region for you, including the region name, endpoint, and whether the region is opt-in status.
Examples
AWS region info
Determine the areas in which your AWS services are deployed and their opt-in statuses. This can help you manage your resources more effectively, particularly for services that require manual opt-in.
select name, opt_in_statusfrom aws_region;
select name, opt_in_statusfrom aws_region;
List of AWS regions which are enable
Discover the segments that are not currently active in your AWS regions. This can help you understand which regions are not utilized, potentially highlighting areas for infrastructure optimization or cost savings.
select name, opt_in_statusfrom aws_regionwhere opt_in_status = 'not-opted-in';
select name, opt_in_statusfrom aws_regionwhere opt_in_status = 'not-opted-in';
Control examples
- All Controls > Backup > Backup plan should exist in a region
- All Controls > Backup > Backup report plan should exist in a region where backup plan is enabled
- All Controls > Backup > Backup vaults should exist in a region
- All Controls > DRS > DRS jobs should be enabled
- All Controls > GuardDuty > GuardDuty Detector should be centrally configured
- All Controls > IAM > Ensure that IAM Access analyzer is enabled for all regions
- All Controls > IAM > IAM Access analyzer should be enabled without findings
- AWS Config should be enabled
- AWS Foundational Security Best Practices > Config > 1 AWS Config should be enabled
- AWS Foundational Security Best Practices > GuardDuty > 1 GuardDuty should be enabled
- AWS Security Hub should be enabled for an AWS Account
- CIS v1.2.0 > 2 Logging > 2.5 Ensure AWS Config is enabled in all regions
- CIS v1.3.0 > 1 Identity and Access Management > 1.21 Ensure that IAM Access analyzer is enabled
- CIS v1.3.0 > 3 Logging > 3.5 Ensure AWS Config is enabled in all regions
- CIS v1.4.0 > 1 Identity and Access Management > 1.20 Ensure that IAM Access analyzer is enabled for all regions
- CIS v1.4.0 > 3 Logging > 3.5 Ensure AWS Config is enabled in all regions
- CIS v1.5.0 > 1 Identity and Access Management > 1.20 Ensure that IAM Access analyzer is enabled for all regions
- CIS v1.5.0 > 3 Logging > 3.5 Ensure AWS Config is enabled in all regions
- CIS v1.5.0 > 4 Monitoring > 4.16 Ensure AWS Security Hub is enabled
- CIS v2.0.0 > 1 Identity and Access Management > 1.20 Ensure that IAM Access analyzer is enabled for all regions
- CIS v2.0.0 > 3 Logging > 3.5 Ensure AWS Config is enabled in all regions
- CIS v2.0.0 > 4 Monitoring > 4.16 Ensure AWS Security Hub is enabled
- CIS v3.0.0 > 1 Identity and Access Management > 1.20 Ensure that IAM Access analyzer is enabled for all regions
- CIS v3.0.0 > 3 Logging > 3.3 Ensure AWS Config is enabled in all regions
- CIS v3.0.0 > 4 Monitoring > 4.16 Ensure AWS Security Hub is enabled
- GuardDuty should be enabled
Schema for aws_region
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
account_id | text | =, !=, ~~, ~~*, !~~, !~~* | The AWS Account ID in which the resource is located. |
akas | jsonb | Array of globally unique identifier strings (also known as) for the resource. | |
name | text | The name of the region | |
opt_in_status | text | The Region opt-in status. The possible values are opt-in-not-required, opted-in, and not-opted-in | |
partition | text | The AWS partition in which the resource is located (aws, aws-cn, or aws-us-gov). | |
region | text | The AWS Region in which the resource is located. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. | |
title | text | Title of the resource. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- aws
You can pass the configuration to the command with the --config
argument:
steampipe_export_aws --config '<your_config>' aws_region