AWS Glossary

AWS Organizations Service Control Policies

Organization-wide IAM policies that define permission boundaries for AWS accounts and organizational units.

AI & assistant-friendly summary

This section provides structured content for AI assistants and search engines. You can cite or summarize it when referencing this page.

Summary

Organization-wide IAM policies that define permission boundaries for AWS accounts and organizational units.

Key Facts

  • Organization-wide IAM policies that define permission boundaries for AWS accounts and organizational units
  • ## Definition Service Control Policies (SCPs) are organization-wide permission policies that define the maximum permissions available in AWS accounts
  • SCPs are not grants (they don't give access); they are permission boundaries that restrict what can be done even if an IAM policy grants permission
  • SCPs don't grant access; IAM policies must still grant permissions
  • **Mistake 2:** Writing overly restrictive SCPs

Entity Definitions

EC2
EC2 is an AWS service relevant to aws organizations service control policies.
S3
S3 is an AWS service relevant to aws organizations service control policies.
RDS
RDS is an AWS service relevant to aws organizations service control policies.
CloudWatch
CloudWatch is an AWS service relevant to aws organizations service control policies.
IAM
IAM is an AWS service relevant to aws organizations service control policies.
compliance
compliance is a cloud computing concept relevant to aws organizations service control policies.

Related Content

Definition

Service Control Policies (SCPs) are organization-wide permission policies that define the maximum permissions available in AWS accounts. SCPs are not grants (they don’t give access); they are permission boundaries that restrict what can be done even if an IAM policy grants permission.

How SCPs Work

Permission Boundary Model:

Example:

Organizational Unit (OU) Hierarchy

Root Organization:

Organizational Units (OUs):

Inheritance Example:

Root
├─ SCP: Prevent disabling CloudTrail
├─ Production OU
│  ├─ SCP: Deny region changes
│  ├─ Account A (inherits both SCPs)
│  └─ Account B (inherits both SCPs)
└─ Development OU
   ├─ SCP: Allow any action
   └─ Account C (inherits Root SCP only)

Common SCP Patterns

Preventive Controls:

Regional Controls:

Compliance Controls:

Cost Controls:

SCP vs IAM Policy

AspectIAM PolicySCP
ScopeIndividual principalOrganization/OU
EffectGrant or denyOnly deny (boundary)
Used byUsers, roles, servicesOrganizations
InheritancePer-userOrganizational hierarchy
AWS ConsoleIAM serviceOrganizations service

Common Mistakes

Mistake 1: Using SCPs instead of IAM policies. SCPs don’t grant access; IAM policies must still grant permissions.

Mistake 2: Writing overly restrictive SCPs. Balance security and operational flexibility; over-restriction breaks deployments.

Mistake 3: Not planning OU structure before rolling out SCPs. Redo OU structure with SCPs in place causes rework.

Implementation Timeline

Week 1: Planning

Week 2-3: Development

Week 4+: Rollout

Related Services

Aws Cloud Security

Explore this service offering

Cloud Compliance Services

Explore this service offering

Need Help with This Topic?

Our AWS experts can help you implement and optimize these concepts for your organization.