- Newest
- Most votes
- Most comments
Hello.
Even if you submit a UI improvement suggestion via AWS re:Post, it is unlikely that your suggestion will be responded to, so I recommend that you submit it using "Feedback" at the bottom left of the AWS Management Console.
I don't work for AWS or speak on their behalf, but from my general professional experience, I doubt the management console is going to be developed in that direction. However, you can implement your own safeguards by modifying the IAM permissions policies of the users who make those types of mistakes.
For example, you could create a managed IAM policy containing the following and attach it to the IAM roles, IAM users, or user groups to which the IAM users belong. This will prevent route tables from being attached to or detached from subnets without the tag key confirm-route-table-change set to confirm (with "confirm" evaluated case-insensitively) on the subnet, unless the change is being made via CloudFormation.
Your admins/developers would need to confirm that they want to make the modification by adding the confirmation tag on the subnets they know they want to risk replacing the route table for.
To avoid the issue of admins getting lazy and tagging all subnets this way, or simply leaving behind the tag and it still being present when making future changes, you could additionally set an EventBridge Schedule to trigger a Lambda function every day, during the night while the team isn't working. The Lambda function could pull a list of all subnets in the regions where you operate, filter them by the presence of the tag key, and removing it. This way, any confirmation given for a subnet would only be valid while they're making the change and wouldn't be left behind.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "DenyUnconfirmedRouteTableChangesToSubnets",
"Effect": "Deny",
"Action": ["ec2:AssociateRouteTable","ec2:DisassociateRouteTable"],
"Resource": "arn:aws:ec2:*:*:subnet/*",
"Condition": {
"StringNotEqualsIgnoreCaseIfExists": {
"aws:ResourceTag/confirm-route-table-change": "confirm"
},
"StringNotEqualsIfExists": {
"aws:CalledViaLast": "cloudformation.amazonaws.com"
}
}
}
]
}
Yes, this is absolutely perfect, but why AWS can't make this change, that will be perfect if it shows alerts, i don't think AWS should ignore this.
Personally, I don't see how one would be configuring routing without realising routing changes have impact. There aren't and never were any warning boxes for switching a VRF for a subnet/VLAN in on-premises networking gear, either, where the effect and impact would've been exactly the same. In AWS, permissions can be configured to build custom guardrails for details like this, but frankly, I don't think the need for them should be normalised.
Relevant content
- asked 2 years ago
- asked 4 years ago
- AWS OFFICIALUpdated 2 years ago

Agreed. Also, if you have an account team by AWS, you should reach them out so that they can issue what we call a PFR to request the feature on your behalf via the internal channels.