1.2 AWS Organizations, SCPs, and Multi-Account Strategy

Key Takeaways

  • AWS Organizations consolidates multiple AWS accounts into a hierarchy of Organizational Units (OUs) with centralized billing.
  • Service Control Policies (SCPs) set maximum permission guardrails at the OU or account level — they do NOT grant permissions, they restrict them.
  • SCPs do not affect the management account — only member accounts are subject to SCPs.
  • AWS Control Tower automates the setup of a multi-account environment with guardrails, landing zones, and account vending.
  • A multi-account strategy provides strong isolation for workloads, security boundaries, and billing separation.
Last updated: March 2026

AWS Organizations, SCPs, and Multi-Account Strategy

Quick Answer: AWS Organizations lets you manage multiple AWS accounts from a single management account. Service Control Policies (SCPs) set maximum permission boundaries — they restrict what member accounts CAN do but never grant permissions. Use a multi-account strategy to isolate workloads, enforce security boundaries, and simplify billing.

AWS Organizations

AWS Organizations is a free service that lets you consolidate multiple AWS accounts into an organization for centralized management and governance.

Key Features

FeatureDescription
Consolidated BillingSingle payment method for all accounts; volume discounts shared
Organizational Units (OUs)Group accounts into a hierarchy (e.g., Production OU, Development OU)
Service Control PoliciesPermission guardrails applied to OUs or accounts
Account CreationProgrammatically create new accounts via API
Resource SharingShare resources across accounts via AWS RAM

Organization Structure

Root (Management Account)
├── Production OU
│   ├── Prod-App-A Account
│   ├── Prod-App-B Account
│   └── Prod-Shared-Services Account
├── Development OU
│   ├── Dev-App-A Account
│   └── Dev-App-B Account
├── Security OU
│   ├── Log Archive Account
│   └── Security Tooling Account
└── Sandbox OU
    └── Developer Sandbox Accounts

Service Control Policies (SCPs)

SCPs define the maximum permissions for member accounts in an organization. They act as guardrails — they can only restrict, never grant.

SCP Key Rules (Critical for Exam)

RuleExplanation
SCPs restrict permissionsThey set the ceiling, not the floor
SCPs do NOT grant permissionsUsers still need IAM policies to do anything
SCPs affect member accounts onlyThe management account is NEVER affected by SCPs
SCPs apply to all users and roles in affected accountsIncluding the account root user
SCP Deny overrides IAM AllowAn SCP deny cannot be overridden

SCP Example: Deny All Except Specific Regions

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "DenyNonApprovedRegions",
      "Effect": "Deny",
      "Action": "*",
      "Resource": "*",
      "Condition": {
        "StringNotEquals": {
          "aws:RequestedRegion": ["us-east-1", "us-west-2", "eu-west-1"]
        }
      }
    }
  ]
}

On the Exam: A common question pattern: "How do you PREVENT users in member accounts from launching resources in unapproved Regions?" Answer: Apply an SCP that denies actions in non-approved Regions.

AWS Control Tower

AWS Control Tower automates the setup of a secure multi-account environment based on best practices.

FeatureDescription
Landing ZonePre-configured multi-account environment
GuardrailsPreventive (SCPs) and detective (AWS Config rules) controls
Account FactoryAutomated account provisioning with pre-configured settings
DashboardCentralized view of compliance across all accounts

When to use Control Tower vs. Organizations:

  • Organizations only — You need basic multi-account management and SCPs
  • Control Tower — You want automated setup, guardrails, account factory, and compliance monitoring

Multi-Account Strategy Benefits

BenefitExplanation
Security isolationCompromised account cannot affect others
Billing separationClear cost attribution per team/project
Blast radius reductionFailed deployments or misconfigurations are contained
ComplianceDifferent accounts can have different compliance controls
Service limitsEach account has its own service quotas
Test Your Knowledge

An organization wants to prevent any IAM user or role in its development accounts from launching EC2 instances larger than t3.large. What should they use?

A
B
C
D
Test Your Knowledge

Which statement about Service Control Policies (SCPs) is TRUE?

A
B
C
D