AWS Organization & Service Control Policies (SCPs)
Deny Access to Specific Service
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": "redshift:*", "Resource": "*" } ] }
Deny Specific Actions
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": "s3:DeleteBucket", "Resource": "*" } ] }
Deny Access Based on Conditions
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": "ec2:*", "Resource": "*", "Condition": { "NotIpAddress": { "aws:SourceIp": [ "203.0.113.0/24" ] } } } ] }
Require MFA for Certain Actions
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": [ "iam:ChangePassword", "sts:GetFederationToken", "sts:AssumeRole" ], "Resource": "*", "Condition": { "BoolIfExists": { "aws:MultiFactorAuthPresent": "false" } } } ] }
Prevent IAM Users and Roles Creation
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": [ "iam:CreateUser", "iam:CreateRole" ], "Resource": "*" } ] }
Restrict Resource Creation to Specific Regions
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": "*", "Resource": "*", "Condition": { "StringNotEquals": { "aws:RequestedRegion": [ "us-east-1", "us-west-2" ] } } } ] }
Prevent Deletion of Specific Resources
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": "kms:ScheduleKeyDeletion", "Resource": "*" } ] }