You must be logged in to view saved presets
This SCP prevents users or roles in any affected account from deleting KMS keys, either directly as a command or through the console.
See Related Configuration Items for a Configuration Package to deploy multiple SCPs to an AWS Account.
Configuration template includes a CloudFormation custom resource to deploy into an AWS account.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"kms:ScheduleKeyDeletion",
"kms:Delete*"
],
"Resource": "*",
"Effect": "Deny"
}
]
}