A collection of configuration templates for AWS Organizations resources as well as security controls for monitoring and protecting AWS Organizations configuration such as Config Rules, CloudWatch Alarms, EventBridge Rules, IAM policies, and more.
This template creates an AWS::Organizations::ResourcePolicy resource that specifies the organization resource policy content as a JSON object. The organization resource policy allows the specified AWS account to perform the organizations:DescribeOrganization action on all resources.
This template creates an AWS::Organizations::ResourcePolicy resource that specifies the organization resource policy content as a JSON string. The organization resource policy allows the specified AWS account to perform the organizations:DescribeOrganization action on all resources.
This template creates an AWS Organizations Organization with the FeatureSet property set to ALL. The organization will have all available features enabled.
This template creates an AWS Organizations Organization with the FeatureSet property set to CONSOLIDATED_BILLING. The organization will have consolidated billing enabled.
This template creates an Organizational Unit (OU) named 'TestTemplateOU' directly under the root of the AWS Organizations. The template requires the 'OrganizationRootId' parameter to specify the root of the organization.
This template creates a nested Organizational Unit (OU) structure.
This template retrieves and lists all service control policies for the root of an AWS Organizations structure.
This template fetches the current AWS Organizations root ID, filters for service control policies, and retrieves a specific organizational policy by ID.
Creates a resource-based delegation policy in AWS Organizations to delegate policy management to a specified member account.
A CloudWatch Alarm that triggers when changes are made to AWS Organizations.
This SCP denies access to any operations outside of the specified AWS Region, except for actions in the listed services (These are global services that cannot be whitelisted based on region).
This SCP prevents users or roles in any affected account from disabling a CloudTrail log, either directly as a command or through the console.
This SCP prevents users or roles in any affected account from running AWS Config operations that could disable AWS Config or alter its rules or triggers.
This SCP prevents users or roles in any affected account from running any of the CloudWatch commands that could delete or change your dashboards or alarms.
This SCP prevents users or roles in any affected account from changing the configuration of your Amazon EC2 virtual private clouds (VPCs) to grant them direct access to the internet. It doesn't block existing direct access or any access that routes through your on-premises network environment.
This SCP prevents users or roles in any affected account from deleting any S3 bucket or objects.
This SCP prevents users or roles in any affected account from accessing any S3 objects outside the specified AWS Organization
This SCP prevents users or roles in any affected account from deleting KMS keys, either directly as a command or through the console.
This SCP prevents users or roles in any affected account from leaving AWS Organizations, either directly as a command or through the console.
This SCP prevents users or roles in any affected account from disabling or modifying Amazon GuardDuty settings, either directly as a command or through the console.
This SCP prevents users or roles in any affected account from modifying the account and billing settings, either directly as a command or through the console.
This SCP restricts IAM principals in an AWS account from changing creating, updating or deleting settings for Internet Gateways, NAT Gateways, VPC Peering, VPN Gateways, Client VPNs, Direct Connect and Global Accelerator.
This SCP restricts IAM principals in an AWS account from changing creating, updating or deleting Internet Gateways and NAT Gateways.
This SCP prevents restricts the root user in an AWS account from taking any action, either directly as a command or through the console.
This SCP restricts IAM principals from creating new IAM users or IAM Access Keys in an AWS account.
This SCP restricts IAM principals from creating new IAM users or IAM Access Keys in an AWS account with an exception for a specified Administrator IAM role.
This SCP restricts IAM principals from modifying existing IAM password policies in an AWS account with an exception for a specified Administrator IAM role.
This SCP restricts IAM principals in accounts from making changes to an IAM role created in an AWS account (This could be a common administrative IAM role created in all accounts in your organization).
This SCP restricts IAM principals in accounts from making changes to an IAM role created in an AWS account except if the change was being done by that specified role(This could be a common administrative IAM role created in all accounts in your organization).
This SCP requires that all Amazon S3 buckets use AES256 encryption in an AWS Account
This SCP prevents the launch of any EC2 instance type that is not whitelisted by the policy (default: t3.micro).
This SCP requires that multi-factor authentication (MFA) is enabled before a principal or root user can stop an Amazon EC2 instance.
This SCP prevents users or roles in any affected account from modifying the S3 Block Public Access Settings in an Account.
This SCP prevents users or roles in any affected account from deleting Amazon EC2 flow logs or CloudWatch log groups or log streams.
This SCP restrict users in your AWS Organizations account to creating VPCs with CIDRs from a specific IPv4 pool and associating CIDRs to the VPCs from the pool. Users in the account will not be able to create VPCs with CIDRs or associate CIDRs to VPCs from any other pools from the one you choose.
This SCP prevents users or roles in any affected account from disabling AWS Security Hub, deleting member accounts or disassociating an account from a master Security Hub account.
This SCP prevents users or roles in any affected account from deleting AWS Access Analyzer in an AWS account.
This SCP prevents users or roles in any affected account from disabling Amazon Macie, deleting member accounts or disassociating an account from a master Macie account.
This SCP prevents users or roles in any affected account from disabling Amazon Macie, deleting member accounts or disassociating an account from a master Macie account.
This SCP prevents users or roles in any affected account from creating Resource Access Shares using RAM that are shared with external principals outside the organization
This SCP prevents users from creating open Lambda HTTP URLs that do not required authentication and enforces AWS_IAM authentication on all Lambda URLs
This SCP prevents users or roles in any affected account from deleting or changing AWS Backup policies and vaults
This SCP restricts IAM principals in accounts from making changes to specific CloudFormation stacks with the exception of a specific IAM role (This could be a common administrative IAM role created in all accounts in your organization)
This SCP prevents users or roles in any affected account from disabling ebs default encryption
This SCP restricts IAM principals in accounts from making changes to specific Lambda Functions with the exception of a specific IAM role (This could be a common administrative IAM role created in all accounts in your organization)
This SCP restricts IAM principals in accounts from making changes to an IAM role created in an AWS account except if the change was being done by that specified role(This could be a common administrative IAM role created in all accounts in your organization)
This SCP restricts IAM principals in accounts from enabling/disabling AWS regions except if the change was being done by that specified role(This could be a common administrative IAM role created in all accounts in your organization)
This SCP restricts IAM principals in accounts from creating new S3 buckets without ACLs disabled (bucket owner enforced)
This SCP restricts IAM principals in accounts from making changes to specific SNS topics with the exception of a specific IAM role (This could be a common administrative IAM role created in all accounts in your organization)
This SCP prevents users or roles in any affected account from creating a default VPC or Subnets