<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Govcloud on ferkakta.dev</title><link>https://ferkakta.dev/tags/govcloud/</link><description>Recent content in Govcloud on ferkakta.dev</description><generator>Hugo</generator><language>en-US</language><copyright>Copyright fizz.</copyright><lastBuildDate>Tue, 31 Mar 2026 20:00:00 -0500</lastBuildDate><atom:link href="https://ferkakta.dev/tags/govcloud/index.xml" rel="self" type="application/rss+xml"/><item><title>Three holes in the partition wall</title><link>https://ferkakta.dev/three-holes-in-the-partition-wall/</link><pubDate>Tue, 31 Mar 2026 20:00:00 -0500</pubDate><guid>https://ferkakta.dev/three-holes-in-the-partition-wall/</guid><description>&lt;p&gt;I assumed GovCloud was AWS with a different region code. I wrote a whole post about how wrong that was. The partition wall between commercial AWS and GovCloud is real — no shared IAM, no cross-partition role assumption, no federated identity, no common STS endpoints. An &lt;code&gt;arn:aws:&lt;/code&gt; principal cannot see an &lt;code&gt;arn:aws-us-gov:&lt;/code&gt; resource. They are separate universes connected by a billing relationship and nothing else.&lt;/p&gt;
&lt;p&gt;Except that&amp;rsquo;s not quite true either. There are three holes in the wall, and I found them one at a time over the course of a month.&lt;/p&gt;</description></item><item><title>I assumed GovCloud was AWS with a different region code. It took two weeks to prove me wrong.</title><link>https://ferkakta.dev/govcloud-surprises/</link><pubDate>Wed, 11 Mar 2026 23:00:00 -0400</pubDate><guid>https://ferkakta.dev/govcloud-surprises/</guid><description>&lt;p&gt;I needed a GovCloud account for a multi-tenant NIST compliance platform. I&amp;rsquo;d been running commercial AWS infrastructure for months — EKS, Terraform, tenant provisioning, the whole stack. GovCloud would be the same thing in a different region. That was the assumption. It lasted about four hours.&lt;/p&gt;
&lt;h2 id="the-account-that-doesnt-exist-yet"&gt;The account that doesn&amp;rsquo;t exist yet&lt;/h2&gt;
&lt;p&gt;My management account couldn&amp;rsquo;t call &lt;code&gt;CreateGovCloudAccount&lt;/code&gt;. The API returned &lt;code&gt;ConstraintViolationException&lt;/code&gt; with a message about not being &amp;ldquo;enabled for access to GovCloud&amp;rdquo; and no guidance on what that meant. I filed a support case. AWS enabled the permission two days later, and as a side effect created a standalone GovCloud account that had no relationship to my Organizations structure — an orphan floating in the partition with disconnected root credentials. I still had to find it and deal with it.&lt;/p&gt;</description></item></channel></rss>