AWS Service Control Policies
AWS Service Control Policies
Read more about one of the architecture designs we did for a client for connecting ON premise to AWS Site to Site VPN in Control Tower.
Introduction- AWS Service Control Policies
Service control policies (SCPs) are a type of organization policy that is used to manage permissions in an organization. Furthermore, AWS Service Control Policies offer central control over the maximum available permissions for all accounts in your organization. SCPs ensures that your accounts stay within the organization’s access control guidelines.
Additionally, Please note: There is no “audit” mode for SCPs or any other way to test if a SCP will break things.
SCPs cannot restrict the Master Account of the Organization. Moreover, this is the primary reason behind not using the Organization Master Account for anything except Organization Activities. This means that you should not put S3 buckets, EC2s, or any other resources in your Organization Master, because you cannot use SCPs to create guardrails around that.
Moreover, in this article we will talk about a few policies like:
Production Specific Policies which you could apply for Production Environment.
In addition, the test environment can have a set of different policies which can be used. For example, Sandbox Policies like:
- Restrict user to create 10x size EC2 instance.
- Allow only approved services rds
- lambda ec2 iam
- Restrict user for confidential services
Production specific AWS Control policies
Furthermore, read the code below that we implemented for production specific policy:
Block service usage in all regions except Sydney. Moreover, block service access for the root user and Deny Account’s ability to leave the Organization.
Prevent resource creation without specifying mandatory tags
Resource Size AWS Control policies
It requires Amazon EC2 instances to use a specific type.
To Require a tag on Resource creation and resource’s Name
Application environment platform cost center
Sandbox Specific Policy
- Furthermore, this policy requires Amazon Elastic Cloud Compute (EC2) instances to use a specific type.
- Then allow only approved services.
- GP inherited rules.
- Block service usage in all regions except Sydney.
- Then deny the Account’s ability to leave the Organization.
Limitations
Limitations: Furthermore, We could not get a few of the services to work with the service control policies. However, policies like EC2, EKS, ECS and Secrets Manager worked fine. Although, Lambda and S3 buckets do not work with the tag restrictions because they do not support tag based authorization in IAM policies. Further, we could not get RDS, Athena, or Amplify to work because although, they may support tag-based restrictions in IAM policies, the consoles of those services do not let you add tags upon resource creation.
For example, you can tag a RDS instance during creation in the CLI, but the console does not let you do it during creation. Moreover, This means that if your users are in the console, there is no way to ask them to add tags upon RDS creation.
Additionally, To know more, read this link AWS services that work with IAM – Compute services – https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-services-that-work- with-iam.html#compute_svcs
Unit Test Screenshots
Below are the screenshots of the resources showing error when not followed with the policy.

When the policies are followed, it creates the workload as expected having the mandatory tags as enforced by the policy.
Conclusion- AWS Service Control Policies
In conclusion, it is important to use the right policy to create workload as expected. If you do not follow the policy, then you will not get the permission. Additionally, setting up AWS control policies is beneficial as it ensures your account stays within your organization’s access control guidelines.
Share us
Get A Quote
Proud Blogs that
make us stand out
Recent Home
S/4 Hana
SAP Fieldglass Resume Ranking setup
Ensure seamless SAP Integration | Secure Access | Auth0 with third-party APIs. Secure authentication &…
Recent Home
sub -O365
Choosing the Right O365 Subscription: Monthly, Annual & Hybrid Commitments
This article explores the various Microsoft 365 subscription models—monthly, annual, and hybrid—and helps you choose…
Recent Home
Awards
Peritos Wins Globalisation Excellence Award | MSME Star Stories 2024
Peritos Solutions is proud to be a winner in the “Globalisation Excellence” category at MSME…
Recent Home
Awards
Peritos Wins at NABH Quality Connect Fiesta 2024
Peritos proudly receives the NABH Quality Connect Healthcare Quality Pitch Award at the 2024 Competitions…
Recent Home
Awards
Peritos: New Zealand ICT Award Finalist for Technical Award 2025
Peritos Solutions has been named a finalist for the 2025 New Zealand ICT Technical Award,…
Thinking about a project? Get in touch with us.
Connect with Us Today through the Details Below or Fill
Out the Form for a Prompt Response
Book Free Consultation
Guaranteed response within 8 business hours.
Trusted by Startups and Fortune 500 companies
We can handle projects of all complexities.
Startups to Fortune 500, we have worked with all.
Top 1% industry talent to ensure your digital success.









