scp
This component is responsible for creating a single Service Control Policy (SCP) and optionally attaching it to a target (organization root, OU, or account).
Unlike the monolithic account component which manages SCPs as part of the organization hierarchy,
this component follows the single-resource pattern - it only manages a single SCP.
This component should be deployed from the management/root account as it creates SCPs within AWS Organizations.
Usage
Stack Level: Global (deployed in the management/root account)
Using the SCP Policy Catalog (recommended)
This component ships with a catalog/ directory of pre-built SCP policies based on
CloudPosse terraform-aws-service-control-policies v0.15.1.
Each file contains a single policy statement that maps to one SCP. Use Atmos !include to
reference catalog files directly (local path) or from a remote source:
Local include (when the catalog is vendored with the component):
components:
terraform:
aws-scp/iam-restrictions:
metadata:
component: aws-scp
vars:
enabled: true
policy_name: IAMRestrictions
policy_description: "Restrict IAM user creation and deny root account access"
policy_statements:
- !include catalog/DenyIAMCreatingUsers.yaml
- !include catalog/DenyIAMRootAccount.yaml
- !include catalog/DenyLeavingOrganization.yaml
target_id: !terraform.output aws-organizational-unit/core organizational_unit_id
Remote include (reference the catalog directly from GitHub):
components:
terraform:
aws-scp/iam-restrictions:
metadata:
component: aws-scp
vars:
enabled: true
policy_name: IAMRestrictions
policy_statements:
- !include "https://github.com/cloudposse-terraform-components/aws-scp/blob/main/catalog/DenyIAMCreatingUsers.yaml"
- !include "https://github.com/cloudposse-terraform-components/aws-scp/blob/main/catalog/DenyIAMRootAccount.yaml"
- !include "https://github.com/cloudposse-terraform-components/aws-scp/blob/main/catalog/DenyLeavingOrganization.yaml"
target_id: !terraform.output aws-organizational-unit/core organizational_unit_id
Atmos supports multiple remote protocols including https://, github://, s3://, and gcs://
via go-getter. Standard GitHub URLs
(with /blob/ or /tree/) are automatically converted to raw content URLs.
Available catalog files:
Account & Organization:
DenyAccountRegionDisableEnable.yaml- Deny enabling/disabling AWS regionsDenyLeavingOrganization.yaml- Prevent leaving the organizationDenyRootAccountAccess.yaml- Deny all actions by root accountDenyAllAccess.yaml- Deny all access (quarantine)
IAM:
DenyIAMCreatingUsers.yaml- Deny IAM user and access key creationDenyIAMRolesChanges.yaml- Deny IAM role modificationsDenyIAMNoMFA.yaml- Require MFA for most actions (usesnot_actions)DenyIAMRootAccount.yaml- Deny all actions by IAM root account
EC2 & Compute:
DenyEC2NonNitroInstances.yaml- Require Nitro-based instance typesDenyEC2InstancesWithoutEncryptionInTransit.yaml- Require encryption-in-transit capable instancesDenyEC2PublicAMI.yaml- Deny launching from public AMIsDenyEC2AssociatePublicIp.yaml- Deny public IP assignmentDenyEC2WithNoIMDSv2.yaml- Require IMDSv2DenyEC2ApiWithNoMFA.yaml- Require MFA for stop/terminateRequireEBSEncryption.yaml- Require EBS volume encryptionDenyLambdaWithoutVpc.yaml- Require VPC for Lambda functions
Storage & Database:
DenyS3DeleteBucketsAndObjects.yaml- Prevent S3 bucket/object deletionDenyS3BucketsPublicAccess.yaml- Prevent modifying S3 public access blocksDenyS3IncorrectEncryptionHeader.yaml- Require S3 server-side encryptionDenyS3UnEncryptedObjectUploads.yaml- Deny unencrypted S3 uploadsDenyRDSUnencrypted.yaml- Require RDS encryptionDenyDeletingKMSKeys.yaml- Prevent KMS key deletion
Networking:
DenyVpcDeletingFlowLogs.yaml- Protect VPC flow logsDenyVpcInternetAccess.yaml- Deny internet gateway and VPC peering creationDenyRoute53DeletingZones.yaml- Prevent hosted zone deletion
Security & Monitoring:
DenyCloudTrailActions.yaml- Protect CloudTrail configurationDenyCloudWatchDeletingLogs.yaml- Protect CloudWatch log groupsDenyDisablingCloudWatch.yaml- Protect CloudWatch alarms and dashboardsDenyConfigRulesDelete.yaml- Protect AWS Config rules and recordersDenyGuardDutyDisassociation.yaml- Prevent GuardDuty disassociationDenyDisablingGuardDuty.yaml- Protect GuardDuty configurationDenyShieldlRemoval.yaml- Prevent Shield protection removal
SageMaker:
DenySagemakerDirectInternetNotebook.yaml- Deny direct internet for notebooksDenySagemakerWithoutRootAccess.yaml- Require root access for notebooksDenySagemakerWithoutInterContainerEncrypt.yaml- Require inter-container encryptionDenyeSagemakerWithoutVpcDomain.yaml- Deny public internet domains
Using inline policy_statements
components:
terraform:
aws-scp/deny-leaving-organization:
metadata:
component: aws-scp
vars:
enabled: true
policy_name: DenyLeavingOrganization
policy_description: "Prevents accounts from leaving the organization"
policy_statements:
- sid: "DenyLeaveOrganization"
effect: "Deny"
actions:
- "organizations:LeaveOrganization"
resources:
- "*"
target_ids:
- !terraform.output aws-organizational-unit/core organizational_unit_id
Using policy_content (raw JSON)
components:
terraform:
aws-scp/custom-policy:
metadata:
component: aws-scp
vars:
enabled: true
policy_name: CustomPolicy
policy_content: |
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Deny",
"Action": ["ec2:RunInstances"],
"Resource": "*"
}
]
}
target_ids:
- !terraform.output aws-organizational-unit/plat organizational_unit_id
Policy Without Attachment
Create a policy without attaching it to any target:
components:
terraform:
aws-scp/deny-root-user:
metadata:
component: aws-scp
vars:
enabled: true
policy_name: DenyRootUser
attach_to_target: false
policy_statements:
- sid: "DenyRootUser"
effect: "Deny"
actions:
- "*"
resources:
- "*"
conditions:
- test: "StringLike"
variable: "aws:PrincipalArn"
values:
- "arn:aws:iam::*:root"
Importing an Existing SCP
To import an existing SCP:
-
Get the policy ID from AWS Console or CLI
-
Set the
import_policy_idvariable:vars:
import_policy_id: "p-xxxxxxxxxx" -
Run
atmos terraform apply
After successful import, you can remove the import_policy_id variable.
Note: If you don't need import functionality, you can exclude
imports.tfwhen vendoring the component.
Policy Statements Format
Each statement must specify either actions or not_actions, but not both.
not_actions maps to the IAM NotAction element, which matches all actions except the listed ones.
policy_statements:
- sid: "OptionalStatementId"
effect: "Deny" # or "Allow"
actions: # use actions OR not_actions
- "service:Action"
resources:
- "*"
conditions: # optional
- test: "StringEquals"
variable: "aws:RequestedRegion"
values:
- "us-east-1"
- sid: "ExampleWithNotActions"
effect: "Deny"
not_actions: # matches everything EXCEPT these actions
- "iam:CreateVirtualMFADevice"
- "iam:EnableMFADevice"
resources:
- "*"
Related Components
This component is part of a suite of single-resource components for AWS Organizations:
| Component | Purpose |
|---|---|
aws-organization | Creates/imports the AWS Organization |
aws-organizational-unit | Creates/imports a single OU |
aws-account | Creates/imports a single AWS Account |
aws-account-settings | Configures account settings |
aws-scp | Creates/imports Service Control Policies (this component) |
Variables
Required Variables
region(string) requiredAWS Region
Optional Variables
attach_to_target(bool) optionalWhether to attach the SCP to a target. Set to false to create the policy without attaching it.
Default value:
trueimport_policy_id(string) optionalThe ID of an existing SCP to import
Default value:
nullimport_target_ids(list(string)) optionalThe IDs of the targets (organization roots, OUs, or accounts) that already have the SCP attached, to import existing attachments. Must be a subset of target_ids.
Default value:
[ ]policy_content(string) optionalThe JSON policy document for the SCP. If not provided, policy_statements will be used to generate the policy.
Default value:
nullpolicy_description(string) optionalDescription of the SCP
Default value:
"Service Control Policy managed by Terraform"policy_name(string) optionalThe name of the Service Control Policy. Defaults to module.this.id
Default value:
nullpolicy_statementsoptionalList of policy statements to generate the SCP. Alternative to policy_content. Each statement must specify either 'actions' or 'not_actions', but not both.
Type:
list(object({
sid = optional(string)
effect = string
actions = optional(list(string), [])
not_actions = optional(list(string), [])
resources = list(string)
conditions = optional(list(object({
test = string
variable = string
values = list(string)
})), [])
}))Default value:
[ ]skip_destroy(bool) optionalIf true, the policy will be detached from the target but not destroyed when removed from Terraform
Default value:
falsetarget_id(string) optionalDEPRECATED: Use
target_idsinstead. The ID of the organization root, OU, or account to attach the SCP to.Default value:
nulltarget_ids(list(string)) optionalThe IDs of the organization roots, OUs, or accounts to attach the SCP to
Default value:
[ ]
Context Variables
The following variables are defined in the context.tf file of this module and part of the terraform-null-label pattern.
context.tf file of this module and part of the terraform-null-label pattern.additional_tag_map(map(string)) optionalAdditional key-value pairs to add to each map in
tags_as_list_of_maps. Not added totagsorid.
This is for some rare cases where resources want additional configuration of tags
and therefore take a list of maps with tag key, value, and additional configuration.Required: No
Default value:
{ }attributes(list(string)) optionalID element. Additional attributes (e.g.
workersorcluster) to add toid,
in the order they appear in the list. New attributes are appended to the
end of the list. The elements of the list are joined by thedelimiter
and treated as a single ID element.Required: No
Default value:
[ ]context(any) optionalSingle object for setting entire context at once.
See description of individual variables for details.
Leave string and numeric variables asnullto use default value.
Individual variable settings (non-null) override settings in context object,
except for attributes, tags, and additional_tag_map, which are merged.Required: No
Default value:
{
"additional_tag_map": {},
"attributes": [],
"delimiter": null,
"descriptor_formats": {},
"enabled": true,
"environment": null,
"id_length_limit": null,
"label_key_case": null,
"label_order": [],
"label_value_case": null,
"labels_as_tags": [
"unset"
],
"name": null,
"namespace": null,
"regex_replace_chars": null,
"stage": null,
"tags": {},
"tenant": null
}delimiter(string) optionalDelimiter to be used between ID elements.
Defaults to-(hyphen). Set to""to use no delimiter at all.Required: No
Default value:
nulldescriptor_formats(any) optionalDescribe additional descriptors to be output in the
descriptorsoutput map.
Map of maps. Keys are names of descriptors. Values are maps of the form
\{<br/> format = string<br/> labels = list(string)<br/> \}
(Type isanyso the map values can later be enhanced to provide additional options.)
formatis a Terraform format string to be passed to theformat()function.
labelsis a list of labels, in order, to pass toformat()function.
Label values will be normalized before being passed toformat()so they will be
identical to how they appear inid.
Default is{}(descriptorsoutput will be empty).Required: No
Default value:
{ }enabled(bool) optionalSet to false to prevent the module from creating any resources
Required: NoDefault value:
nullenvironment(string) optionalID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT'
Required: NoDefault value:
nullid_length_limit(number) optionalLimit
idto this many characters (minimum 6).
Set to0for unlimited length.
Set tonullfor keep the existing setting, which defaults to0.
Does not affectid_full.Required: No
Default value:
nulllabel_key_case(string) optionalControls the letter case of the
tagskeys (label names) for tags generated by this module.
Does not affect keys of tags passed in via thetagsinput.
Possible values:lower,title,upper.
Default value:title.Required: No
Default value:
nulllabel_order(list(string)) optionalThe order in which the labels (ID elements) appear in the
id.
Defaults to ["namespace", "environment", "stage", "name", "attributes"].
You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present.Required: No
Default value:
nulllabel_value_case(string) optionalControls the letter case of ID elements (labels) as included in
id,
set as tag values, and output by this module individually.
Does not affect values of tags passed in via thetagsinput.
Possible values:lower,title,upperandnone(no transformation).
Set this totitleand setdelimiterto""to yield Pascal Case IDs.
Default value:lower.Required: No
Default value:
nulllabels_as_tags(set(string)) optionalSet of labels (ID elements) to include as tags in the
tagsoutput.
Default is to include all labels.
Tags with empty values will not be included in thetagsoutput.
Set to[]to suppress all generated tags.
Notes:
The value of thenametag, if included, will be theid, not thename.
Unlike othernull-labelinputs, the initial setting oflabels_as_tagscannot be
changed in later chained modules. Attempts to change it will be silently ignored.Required: No
Default value:
[
"default"
]name(string) optionalID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as atag.
The "name" tag is set to the fullidstring. There is no tag with the value of thenameinput.Required: No
Default value:
nullnamespace(string) optionalID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique
Required: NoDefault value:
nullregex_replace_chars(string) optionalTerraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set,"/[^a-zA-Z0-9-]/"is used to remove all characters other than hyphens, letters and digits.Required: No
Default value:
nullstage(string) optionalID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release'
Required: NoDefault value:
nulltags(map(string)) optionalAdditional tags (e.g.
{'BusinessUnit': 'XYZ'}).
Neither the tag keys nor the tag values will be modified by this module.Required: No
Default value:
{ }tenant(string) optionalID element (Rarely used, not included by default). A customer identifier, indicating who this instance of a resource is for
Required: NoDefault value:
null
Outputs
attachedWhether the SCP was attached to any targets
attachment_idsMap of target IDs to policy attachment IDs
policy_arnThe ARN of the Service Control Policy
policy_idThe ID of the Service Control Policy
policy_nameThe name of the Service Control Policy
target_idsThe target IDs the SCP is attached to
Dependencies
Requirements
terraform, version:>= 1.7.0aws, version:>= 5.66
Providers
aws, version:>= 5.66
Modules
| Name | Version | Source | Description |
|---|---|---|---|
this | 0.25.0 | cloudposse/label/null | n/a |
Resources
The following resources are used by this module:
aws_organizations_policy.this(resource)aws_organizations_policy_attachment.this(resource)
Data Sources
The following data sources are used by this module: