OpsCanary
Back to daily brief
awsiamPractitioner

Mastering Service Control Policies (SCPs) for IAM Governance

5 min read AWS DocsApr 21, 2026
PractitionerHands-on experience recommended

Service Control Policies (SCPs) exist to provide a centralized way to manage permissions across your AWS organization. They act as permission guardrails, setting limits on what IAM users and roles can do. This is particularly important in large organizations where you need to enforce security and compliance without micromanaging every account. SCPs ensure that even if an account administrator tries to grant broad permissions, those permissions can be blocked if they conflict with the SCPs set at a higher organizational level.

SCPs work by defining the maximum available permissions for IAM users and roles. They do not grant permissions on their own but rather restrict what can be done based on the intersection of SCPs, resource control policies, and identity-based policies. For example, if a permission is blocked at any level above the account, users in that account cannot use that permission, even if they have an AdministratorAccess policy attached. This means that careful planning is required when implementing SCPs to avoid inadvertently locking users out of necessary actions.

In production, you need to be cautious with SCPs. AWS strongly advises against attaching SCPs to the root of your organization without thorough testing, as this can have widespread impacts. Additionally, removing the FullAWSAccess policy without a proper replacement can lead to failures across member accounts. Remember that SCPs cannot restrict actions performed by the management account or those using service-linked roles. Always test changes in a controlled environment before rolling them out organization-wide.

Key takeaways

  • Define clear permission guardrails using SCPs to manage IAM user actions.
  • Understand that SCPs do not grant permissions; they restrict them based on higher-level policies.
  • Avoid attaching SCPs to the root without testing their impact on accounts.
  • Do not remove the FullAWSAccess policy without a suitable replacement to prevent access failures.
  • Remember that SCPs cannot restrict actions from the management account or service-linked roles.

Why it matters

In production, SCPs help enforce security policies across multiple accounts, reducing the risk of unauthorized access and ensuring compliance with organizational standards. This centralized control is vital for maintaining a secure AWS environment.

Code examples

plaintext
AdministratorAccess
plaintext
FullAWSAccess

When NOT to use this

You can't use SCPs to restrict any actions performed by the management account or those attached to service-linked roles. The official docs don't call out specific anti-patterns here. Use your judgment based on your scale and requirements.

Want the complete reference?

Read official docs

Test what you just learned

Quiz questions written from this article

Take the quiz →

Get the daily digest

One email. 5 articles. Every morning.

No spam. Unsubscribe anytime.