At this point, you may have to rely on the list of public IP ranges for AWS , allowing traffic associated with all CIDR blocks associated with your region.
Part of the resiliency design is for the most part that AWS relies on the ability of its service endpoints not to depend on static addresses and use DNS instead ... but their service endpoints should always be on addresses associated with your region, since there are very few services violate their practice of strict regional separation of service infrastructure.
(CloudFront, Route 53 IAM do, , , , . , .)