Skip to main content

01. AWS Organizations

AWS Organizations is a global service that helps you centrally manage multiple AWS accounts. It allows you to consolidate billing, apply policies, and automate account management.

Key TermDescription
Master Account (Management Account)The main account that creates and manages the organization. Handles consolidated billing.
Child Accounts (Member Accounts)Accounts managed under the master account.
OU (Organizational Unit)Logical grouping of AWS accounts to apply common policies.

➡️ Benefits of AWS Organizations

BenefitDescription
Consolidated BillingAll accounts under the organization share one bill managed by the master account.
Volume DiscountsAggregated usage across accounts gives cost benefits on EC2, S3, etc.
Reserved Instance SharingRIs are shared among accounts for better utilization and savings.
Centralized ManagementCreate, manage, and automate account setups using the Organizations API.

➡️ Multi-Account Strategy

You can structure accounts based on different needs:

Strategy TypeExample
By Department/Cost CenterHR, Finance, Sales
By EnvironmentDev, Test, Prod
By ProjectProject-1, Project-2
By Regulation/CompliancePCI, HIPAA

Best Practices:

  • Enable AWS CloudTrail on all accounts and centralize logs in a dedicated S3 bucket.
  • Apply consistent tagging standards for cost tracking.
  • Use isolated logging and monitoring accounts.
  • Prefer multi-account design over single account + multiple VPCs for better isolation.

➡️ Service Control Policies (SCP)

SCPs are policies that control permissions across AWS accounts within an organization.
They define which actions are allowed or denied for users and roles in the account.

FeatureDescription
ScopeApplied at the OU or account level.
AffectsAll users and roles (including root user).
ExcludesMaster (Management) account.
Policy TypeWhitelist (explicit allow) or blacklist (explicit deny).

🟡 Important: SCPs have no effect unless there is an explicit Allow.
🟢 Best Practice: Combine SCPs with IAM policies for layered access control.

SCP Use Cases

Use CaseDescription
Restrict ServicesExample: Block EMR in production accounts.
Compliance EnforcementExample: Enforce PCI compliance by denying non-compliant services.
Sandbox RestrictionsExample: Prevent creation of expensive resources in test environments.

SCP Examples

Deny a Specific Service

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Deny",
"Action": "dynamodb:*",
"Resource": "*"
}
]
}

➡️ Automation with Organizations API

You can automate account creation and management using the AWS Organizations API particularly useful for provisioning sandbox or project-specific accounts programmatically.


➡️ Summary

FeatureDescription
Global ServiceManages multiple AWS accounts centrally.
Consolidated BillingOne bill, shared usage-based discounts.
SCPs (Service Control Policies)Centralized policy enforcement for accounts and OUs.
Multi-Account StrategyDesign based on department, project, environment, or compliance.
Logging Best PracticeCentralize CloudTrail & CloudWatch logs in dedicated accounts.

➡️ Exam Tips

  • SCPs do not affect the master account.
  • SCPs apply to all IAM users and roles, including root, but not service-linked roles.
  • By default, SCPs deny everything — you must explicitly allow actions.
  • Reserved Instance sharing and aggregated usage help reduce costs.
  • Consolidated billing simplifies payment and reporting for all linked accounts.

➡️ AWS Organization Hands On

Step 1: Create Organization Units

IAM Roles Example

Step 2: Enable SCP

IAM Roles Example

Step 3: Attached SCP

IAM Roles Example