AWS Organizations

Hands-On

Demo

In this Demo, we will:

  1. Create AWS Organization.
  2. Create Production and Development OUs.
  3. Create Development SCP (t2/t3 instances, region limits).
  4. Create Production SCP (encryption, deletion protection).
  5. Setup Development tags (Environment, Project).
  6. Setup Production tags (Environment, CostCenter, BusinessUnit).
  7. Enable tag policy reporting.
  8. Attach and test policies.

Agenda

Create an organization

Create 1st Organizational Unit (OU)

Production

Create 2nd OU - Development

Add 1st AWS account

prod-account
learnpde+prod@gmail.com

Create AWS account

Create 2nd Account

learnpde+dev@gmail.com
dev-account

Move Prod 

Move Dev Account 

Policies

Enable Service control policies

Create new service control policy

Development-Service-Control-Policy
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "LimitEC2InstanceTypes",
      "Effect": "Deny",
      "Action": "ec2:RunInstances",
      "Resource": "arn:aws:ec2:*:*:instance/*",
      "Condition": {
        "StringNotLike": {
          "ec2:InstanceType": [
            "t2.*",
            "t3.*"
          ]
        }
      }
    },
    {
      "Sid": "DenyNonApprovedRegions",
      "Effect": "Deny",
      "Action": "*",
      "Resource": "*",
      "Condition": {
        "StringNotEquals": {
          "aws:RequestedRegion": [
            "us-east-1",
            "us-west-2"
          ]
        }
      }
    }
  ]
}

Development-Service-Control-Policy

Attach policy to Development OU

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "EnforceProductionRegions",
      "Effect": "Deny",
      "Action": "*",
      "Resource": "*",
      "Condition": {
        "StringNotEquals": {
          "aws:RequestedRegion": [
            "us-east-1",
            "us-west-2"
          ]
        }
      }
    },
    {
      "Sid": "RequireEncryptedEBSVolumes",
      "Effect": "Deny",
      "Action": [
        "ec2:RunInstances",
        "ec2:CreateVolume"
      ],
      "Resource": [
        "arn:aws:ec2:*:*:volume/*",
        "arn:aws:ec2:*:*:instance/*"
      ],
      "Condition": {
        "Bool": {
          "ec2:Encrypted": "false"
        }
      }
    },

Production-Service-Control-Policy

    {
      "Sid": "DenyDeleteProductionTags",
      "Effect": "Deny",
      "Action": [
        "ec2:DeleteTags",
        "s3:DeleteObjectTagging",
        "rds:RemoveTagsFromResource"
      ],
      "Resource": "*",
      "Condition": {
        "StringEquals": {
          "aws:ResourceTag/Environment": "Production"
        }
      }
    },
    {
      "Sid": "RequireResourceTags",
      "Effect": "Deny",
      "Action": [
        "ec2:RunInstances",
        "rds:CreateDBInstance",
        "s3:CreateBucket"
      ],
      "Resource": "*",
      "Condition": {
        "Null": {
          "aws:RequestTag/Environment": "true",
          "aws:RequestTag/CostCenter": "true",
          "aws:RequestTag/Project": "true"
        }
      }
    }
  ]
}

Production-Service-Control-Policy

Attach Production Service Control Policy 

Enable tag policies

Create Dev Tag Policy 

dev-tag-policy
{
  "tags": {
    "Environment": {
      "tag_key": {
        "@@assign": "Environment"
      },
      "tag_value": {
        "@@assign": [
          "dev"
        ]
      },
      "enforced_for": {
        "@@assign": [
          "ec2:instance",
          "s3:bucket"
        ]
      }
    },
    "Project": {
      "tag_key": {
        "@@assign": "Project"
      },
      "tag_value": {
        "@@assign": [
          "alpha",
          "beta",
          "demo"
        ]
      },
      "enforced_for": {
        "@@assign": [
          "ec2:instance",
          "s3:bucket"
        ]
      }
    }
  }
}
prod-tag-policy

Create prod tag policy

{
    "tags": {
        "environment": {
            "tag_key": {
                "@@assign": "Environment"
            },
            "tag_value": {
                "@@assign": [
                    "prod"
                ]
            },
            "enforced_for": {
                "@@assign": [
                    "ec2:instance",
                    "s3:bucket"
                ]
            }
        },
        "costcenter": {
            "tag_key": {
                "@@assign": "CostCenter"
            },
            "tag_value": {
                "@@assign": [
                    "101",
                    "102",
                    "103"
                ]
            },
            "enforced_for": {
                "@@assign": [
                    "ec2:instance",
                    "s3:bucket"
                ]
            }
        }
    }
}

Attach Dev tag policy to Dev OU

Attach Prod tag policy to Prod OU

Login to Dev AWS Account

https://796973489092.signin.aws.amazon.com/console

Sign in and select Forgot Password

Launch T2 Large

T2-Large

Proceed without key pair

No Problem

Launch M5 Large Instance

M5-Large

Proceed without key pair

Launch Failed because of SCP

Run this command only if it shows as Not Enabled

aws organizations enable-aws-service-access --service-principal tagpolicies.tag.amazonaws.com

AWS Resource Groups

AWS Resource Groups View 

Environment tag key must match tag values

wrongtag
purpose
experiment
Environment
notinlist

Environment must match Tag Values

dev

Other tag Keys are fine

myownkey
myownvalue

Enforce Tag Policy at Creation
Preventive Control - SCP

{
      "Sid": "RequireMandatoryTags",
      "Effect": "Deny",
      "Action": [
        "ec2:RunInstances"
      ],
      "Resource": "arn:aws:ec2:*:*:instance/*",
      "Condition": {
        "Null": {
          "aws:RequestTag/Environment": "true",
          "aws:RequestTag/Project": "true"
        }
      }
    },
    {
      "Sid": "EnforceTagValues",
      "Effect": "Deny",
      "Action": [
        "ec2:RunInstances"
      ],
      "Resource": "arn:aws:ec2:*:*:instance/*",
      "Condition": {
        "ForAnyValue:StringNotLike": {
          "aws:RequestTag/Environment": [
            "dev"
          ],
          "aws:RequestTag/Project": [
            "alpha",
            "beta",
            "demo"
          ]
        }
      }
    }

Add this to Dev SCP

Launch EC2 with no Tags

Launch EC2 with all required tags

Environment
dev
project
alpha
Test-Tags

🙏

Thanks

for

Watching

AWS Organizations - Hands-On Demo

By Deepak Dubey

AWS Organizations - Hands-On Demo

AWS Organizations - Hands-On Demo

  • 53