AWS Organizations Tutorial: Architecture, Pricing, Use Cases, and Hands-On Guide for Management and governance

Category

Management and governance

1. Introduction

AWS Organizations is an AWS Management and governance service that helps you centrally manage and govern multiple AWS accounts. It provides a structured way to group accounts, apply guardrails, and manage billing across an organization.

In simple terms: AWS Organizations lets you build an “account hierarchy” (like folders and subfolders) and enforce organization-wide rules—so teams can move fast without breaking security, compliance, or cost boundaries.

Technically, AWS Organizations is a global AWS control-plane service that creates an organization with a management account, member accounts, organizational units (OUs), and policies (most notably Service Control Policies—SCPs). It integrates closely with identity (IAM), logging (CloudTrail), security services (Security Hub, GuardDuty, etc.), and landing-zone solutions like AWS Control Tower.

The main problem it solves is the “multi-account sprawl” problem: when teams create many AWS accounts for isolation (which is a best practice), it becomes hard to manage access, governance, compliance, and billing consistently. AWS Organizations gives you a centralized governance layer for that multi-account environment.

Naming note (current terminology): AWS used to refer to the “master account.” The current term is management account. Member accounts are member accounts (not “child” accounts). These are terminology updates, not a different service.

2. What is AWS Organizations?

Official purpose (what it’s for):
AWS Organizations helps you centrally manage and govern your environment as you grow and scale on AWS. It enables consolidated billing, hierarchical grouping of accounts, and organization-wide policy controls.

Core capabilities: – Create and manage multiple AWS accounts programmatically. – Organize accounts into a hierarchy using roots and organizational units (OUs). – Apply organization-wide governance using policies (for example SCPs). – Enable and manage trusted access with other AWS services (so those services can operate across your organization). – Centralize billing through consolidated billing and support cost allocation approaches.

Major components:Organization: The top-level container. – Management account: The account that owns the organization and pays the bill under consolidated billing. – Member accounts: Accounts that are part of the organization. – Root: The top-most node in the hierarchy (you can have one root; OUs hang under it). – Organizational units (OUs): Groupings of accounts used for governance and delegation. – Policies: Governance documents you attach to the root, OUs, or accounts. The most common are: – Service Control Policies (SCPs) to set maximum permissions boundaries for accounts/OUs. – Other organization policy types may be available depending on your AWS environment and enabled features (verify current availability in the official docs).

Service type:
A management/governance control-plane service (not a data-plane service). It doesn’t run your workloads; it governs how accounts and permissions are structured.

Scope (regional/global):
AWS Organizations is considered a global service. You can use it from the AWS Management Console and APIs without being tied to a single Region in the way compute services are. Many integrated services remain regional (for example, GuardDuty or CloudTrail trails have region-specific behavior), but the organization structure itself is global.

How it fits into the AWS ecosystem:Identity foundation: Works with IAM and (commonly) AWS IAM Identity Center (successor name for AWS Single Sign-On) for workforce identity in a multi-account structure. – Security foundation: Security services can be delegated administrators across the org (service-dependent). – Landing zones: AWS Control Tower uses AWS Organizations under the hood to set up and govern multi-account environments. – Logging and audit: AWS CloudTrail can be configured for organization-wide visibility (for example, organization trails—verify current requirements in CloudTrail docs).

Official docs entry point:
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html

3. Why use AWS Organizations?

Business reasons

  • Clear cost ownership and chargeback: Separate accounts per team/product/environment and consolidate billing for centralized payment and discounts (where applicable).
  • Faster onboarding: Create accounts from a controlled pipeline instead of ad-hoc “who owns what?” processes.
  • Risk reduction: Avoid “one big account” blast radius and reduce cross-team interference.

Technical reasons

  • Strong isolation boundary: An AWS account is a powerful isolation boundary for IAM, service quotas, and many resource scopes.
  • Central policy management: Apply SCPs to enforce guardrails across many accounts without managing each account independently.
  • Standardized structure: Build repeatable patterns for dev/test/prod, shared services, and security accounts.

Operational reasons

  • Consistent governance at scale: Apply rules once to an OU and have them inherit down the tree.
  • Delegation patterns: Delegate administration of certain AWS services to specific accounts (service-dependent) without sharing the management account broadly.
  • Automation-friendly: Use Organizations APIs/CLI to integrate account provisioning into CI/CD or service catalog workflows.

Security/compliance reasons

  • Preventive controls: SCPs can enforce “this account can never do X,” even if someone attaches an overly permissive IAM policy locally.
  • Central auditability: Organizations changes are logged via AWS CloudTrail management events.
  • Separation of duties: Security teams can operate security tooling in dedicated accounts while application teams operate in separate accounts.

Scalability/performance reasons

  • AWS Organizations helps you scale governance; it’s not about runtime performance of workloads. The key “scaling” is organizational: more accounts, more teams, more services, more policies.

When teams should choose it

  • You expect multiple accounts (now or soon).
  • You need central governance (SCP guardrails, consistent structure).
  • You want consolidated billing with multiple accounts.
  • You plan to adopt AWS Control Tower or a landing-zone model.

When teams should not choose it (or should delay)

  • You truly only need one account and don’t expect growth (rare for production).
  • You can’t accept the operational overhead of multi-account governance yet (though starting early usually reduces long-term pain).
  • Your organization is constrained by policies requiring separate payers/contracts that cannot be consolidated (this is uncommon but can happen—verify with AWS Sales/Support if relevant).

4. Where is AWS Organizations used?

Industries

  • Finance / fintech: Strong separation of duties and strict compliance needs.
  • Healthcare: Data segregation and auditing.
  • SaaS and tech: Multi-tenant architectures, internal platform teams, rapid environment creation.
  • Retail / e-commerce: Multiple workloads and teams with clear cost ownership.
  • Public sector: Strong governance and workload separation.

Team types

  • Platform engineering teams building internal cloud platforms.
  • DevOps/SRE teams standardizing environments.
  • Security engineering / GRC teams enforcing preventive controls.
  • FinOps teams implementing chargeback and spend governance.

Workloads and architectures

  • Multi-environment setups: Separate accounts for dev/test/stage/prod.
  • Shared services model: Dedicated accounts for networking, CI/CD tooling, logging, and security tooling.
  • Business-unit segmentation: Each BU gets an OU and multiple accounts.
  • M&A / multi-entity organizations: Separate subsidiaries in separate OUs with consistent guardrails.

Real-world deployment contexts

  • Production: Almost always used for real governance (SCPs, separation of duties, delegated admins).
  • Dev/test: Commonly used to provision ephemeral accounts or sandbox accounts with strict guardrails.

5. Top Use Cases and Scenarios

Below are realistic scenarios where AWS Organizations is the right tool.

1) Consolidated billing for many accounts

  • Problem: Multiple AWS accounts create fragmented bills and duplicated admin effort.
  • Why AWS Organizations fits: Consolidated billing brings accounts under one payer and provides consolidated cost visibility.
  • Example: A company has 12 product teams with separate AWS accounts; Finance wants a single payer and consolidated reporting.

2) Organizational unit (OU) structure for environment separation

  • Problem: Dev and prod resources are mixed and risky.
  • Why it fits: You can create OUs like Dev, Test, Prod and apply different governance policies.
  • Example: Apply stricter SCPs to Prod while allowing broader experimentation in Dev.

3) Preventive security guardrails with Service Control Policies (SCPs)

  • Problem: A team accidentally grants admin access and creates risky public resources.
  • Why it fits: SCPs define the maximum allowed permissions, limiting what IAM policies can do.
  • Example: Deny disabling CloudTrail or deny creating internet gateways in sensitive accounts.

4) Dedicated security tooling accounts (security OU)

  • Problem: Security tools and audit logs are spread across app accounts.
  • Why it fits: A security OU can host centralized tooling accounts with delegated admin where supported.
  • Example: One account runs Security Hub/GuardDuty admin; findings roll up org-wide.

5) Centralized logging account

  • Problem: Investigations are slow because logs are distributed and mutable.
  • Why it fits: Multi-account design allows a dedicated log archive account; Organizations supports org-wide patterns (with CloudTrail/other tooling).
  • Example: Centralize CloudTrail logs and retain them with strict access controls.

6) Account vending / automated account provisioning

  • Problem: Creating new accounts is slow and inconsistent.
  • Why it fits: Organizations APIs support programmatic account creation; Control Tower can standardize further.
  • Example: An internal portal provisions new accounts into the right OU with baseline policies.

7) Delegated administration for AWS services

  • Problem: Management account access is too sensitive to share widely.
  • Why it fits: Many AWS services support delegated administrator so operations can happen in designated accounts.
  • Example: Security team manages GuardDuty as delegated admin without daily use of the management account.

8) Sandbox OU with strict limits

  • Problem: Engineers need experimentation but risk cost or security incidents.
  • Why it fits: Place sandbox accounts into a sandbox OU with SCPs that restrict expensive services or disallow risky configurations.
  • Example: Deny provisioning of certain instance families or deny creation of internet-facing load balancers (policy design required).

9) M&A: keep acquired business isolated but governed

  • Problem: An acquired company needs autonomy but must meet corporate governance.
  • Why it fits: Move their accounts into a subsidiary OU and apply baseline policies while allowing BU-specific policies.
  • Example: Corporate enforces logging and region restrictions; BU controls everything else.

10) Standardize tag governance (where supported)

  • Problem: Cost allocation and inventory are unreliable due to inconsistent tags.
  • Why it fits: Organizations supports tag governance patterns (policy support depends on AWS features enabled—verify in official docs).
  • Example: Enforce required tag keys like CostCenter and Owner for supported services.

11) Control where workloads can run (region guardrails)

  • Problem: Data residency requirements prohibit non-approved Regions.
  • Why it fits: SCPs can restrict API actions based on requested region (requires careful design).
  • Example: Only allow us-east-1 for most services; keep global services functional.

12) Separate regulated workloads from general workloads

  • Problem: A PCI/regulated workload needs strict separation from general product workloads.
  • Why it fits: Different OUs/accounts with tailored guardrails and logging/monitoring patterns.
  • Example: A PCI OU with tight SCPs, restricted networking, and strong logging controls.

6. Core Features

Feature 1: Organization and multi-account hierarchy (roots, OUs, accounts)

  • What it does: Creates a hierarchical structure to group AWS accounts.
  • Why it matters: Governance is easier when applied to groups rather than one account at a time.
  • Practical benefit: Apply policies to an OU and have them inherited by all accounts within it.
  • Caveats: OU design becomes foundational—changing it later can be operationally disruptive if policies are tightly coupled.

Feature 2: Consolidated billing

  • What it does: Consolidates charges from multiple member accounts into the management account’s bill.
  • Why it matters: Simplifies payment and can enable consolidated cost views.
  • Practical benefit: One payer, multiple accounts, consolidated reporting.
  • Caveats: Billing consolidation is not the same as full cost allocation; you still need tagging, cost categories, and reporting discipline.

Feature 3: Centralized account management (create/invite/remove accounts)

  • What it does: Lets you create new AWS accounts or invite existing accounts into the organization.
  • Why it matters: Standardizes account provisioning and ownership.
  • Practical benefit: Automate account vending, ensure accounts land in the right OU.
  • Caveats: Account creation has prerequisites (unique email, phone verification in some cases) and quotas. Account closure has its own lifecycle.

Feature 4: Service Control Policies (SCPs)

  • What it does: SCPs set the maximum available permissions for accounts/OUs. They do not grant permissions; they limit what IAM permissions can do.
  • Why it matters: Prevents entire classes of risky actions even if local IAM policies are overly permissive.
  • Practical benefit: Implement preventive guardrails (deny disabling logging, restrict Regions, block certain services).
  • Caveats: SCPs can lock you out of actions if misconfigured. Test in non-production OUs first. Also note that some permissions needed to manage the organization may behave differently; verify specifics in official docs.

Feature 5: Policy inheritance and attachment model

  • What it does: Policies can be attached to the root, OUs, or accounts and inherited down the tree.
  • Why it matters: Enables layered governance (baseline + environment-specific + workload-specific).
  • Practical benefit: A “baseline” SCP at root and stricter SCPs at Prod OU.
  • Caveats: Debugging effective permission becomes harder with multiple policies. You need a strong change process.

Feature 6: Delegated administrator (service-dependent)

  • What it does: Lets you designate a member account as an admin for certain AWS services across the organization.
  • Why it matters: Keeps the management account locked down while enabling central operations.
  • Practical benefit: Security tooling admin account can manage findings and configs across member accounts.
  • Caveats: Not every AWS service supports delegated admin. Each service has its own onboarding steps.

Feature 7: Trusted access for AWS services (service integrations)

  • What it does: Allows supported AWS services to integrate with AWS Organizations and perform org-wide operations.
  • Why it matters: Enables centralized security, compliance, and operations tooling.
  • Practical benefit: Easier org-wide enablement/management for supported services.
  • Caveats: Enabling trusted access is a governance decision; it expands a service’s scope. Review security implications per service.

Feature 8: Organization-level visibility and APIs

  • What it does: APIs to list accounts, OUs, policies, and organizational relationships.
  • Why it matters: Enables automation, inventory, and continuous governance.
  • Practical benefit: Build internal tooling that checks if every account is in the right OU with the right guardrails.
  • Caveats: Like many control-plane APIs, changes may be eventually consistent; design automation to handle retries.

Feature 9: Policy types beyond SCPs (availability varies—verify)

  • What it does: AWS Organizations supports multiple policy types (SCPs are the most common). Other policy types exist for specific governance domains.
  • Why it matters: Allows governance beyond just permissions boundaries, depending on your needs and what AWS currently supports.
  • Practical benefit: Centralize certain governance configurations across accounts.
  • Caveats: Policy type support and service coverage can change; always confirm in the AWS Organizations User Guide.

Reference:
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html

7. Architecture and How It Works

High-level service architecture

AWS Organizations is a control plane that maintains: – An organization directory (accounts, OUs, roots) – A policy engine for organization policies (especially SCP evaluation) – Integration points with other AWS services using trusted access and delegated admin patterns

When a principal (user/role) in a member account calls an AWS API, AWS evaluates permissions roughly like this: 1. Identity-based policies (IAM user/role policies) 2. Resource-based policies (where applicable) 3. Permission boundaries / session policies (where applicable) 4. Organizations SCPs (as an additional “filter” that can deny actions) 5. Other AWS authorization logic (service-specific)

Important: SCPs do not grant permissions. Even if an SCP allows something, IAM still must allow it.

Request/data/control flow

  • Control flow: You create OUs, accounts, and attach policies from the management account (or authorized delegated administrators for certain actions).
  • Workload/API flow: Member accounts run workloads normally. AWS Organizations policies influence authorization decisions for those accounts.
  • Audit flow: Organizations API activity is logged in CloudTrail (management events). Org-wide logging patterns are typically implemented with CloudTrail, Config, and security services.

Key integrations

  • AWS Control Tower: Uses Organizations for account factory, OUs, and guardrails (SCP-based and detective controls).
  • AWS IAM Identity Center: Commonly used with Organizations for centralized workforce access to multiple accounts.
  • AWS CloudTrail: Logs Organizations API actions; org-wide trails can support centralized logging patterns (see CloudTrail docs).
  • AWS security services: Many support org integrations and delegated admin (GuardDuty, Security Hub, Inspector, Macie—verify per service).
  • AWS Billing/Cost tools: Consolidated billing is foundational for Cost Explorer and other billing visibility features.

Dependency services

AWS Organizations itself has no data-plane dependencies for your workloads, but multi-account best practices commonly include: – Central logging (S3, CloudTrail, CloudWatch Logs) – Central security tooling (Security Hub, GuardDuty, IAM Identity Center) – Networking patterns (shared VPCs, Transit Gateway) implemented across accounts

Security/authentication model

  • Authentication: Standard AWS authentication (IAM users/roles, federated identities).
  • Authorization: Organizations API access is controlled by IAM permissions in the management account. SCPs then affect what member accounts can do in their own accounts.
  • Separation of duties: Keep the management account highly restricted; use delegated admin accounts and break-glass procedures.

Networking model

AWS Organizations is a control-plane service accessed over AWS public endpoints. No VPC endpoint is typically required (verify current endpoint options in official docs if your environment restricts outbound internet).

Monitoring/logging/governance considerations

  • Enable CloudTrail for management events and ensure Organizations events are captured.
  • Consider organization-wide logging and security baselines (often via Control Tower).
  • Track policy changes via change management and CI/CD for policy documents.

Simple architecture diagram

flowchart TB
  A[Management account<br/>AWS Organizations] --> B[Root]
  B --> C[OU: Security]
  B --> D[OU: Workloads]
  D --> E[Account: Dev]
  D --> F[Account: Prod]
  A --> G[SCPs / Org Policies]
  G --> D
  G --> C

Production-style architecture diagram

flowchart LR
  subgraph Org[AWS Organization]
    MA[Management account<br/>Billing + Org admin]
    R[Root]
    OU1[OU: Security]
    OU2[OU: Shared Services]
    OU3[OU: Workloads]
    A1[Log Archive account]
    A2[Security Tooling account<br/>Delegated admin where supported]
    A3[Networking account]
    P1[Prod app account]
    D1[Dev app account]
  end

  MA --> R
  R --> OU1
  R --> OU2
  R --> OU3
  OU1 --> A1
  OU1 --> A2
  OU2 --> A3
  OU3 --> P1
  OU3 --> D1

  SCP[SCP baseline + OU-specific SCPs] --> R
  SCP --> OU1
  SCP --> OU3

  CT[CloudTrail / Audit] --- MA
  CT --- A1
  SH[Security services<br/>(e.g., Security Hub/GuardDuty)] --- A2
  ID[AWS IAM Identity Center] --- MA
  ID --- P1
  ID --- D1

8. Prerequisites

Account/tenancy requirements

  • An AWS account that will become the management account for AWS Organizations.
  • A valid payment method for the management account (billing must be enabled).
  • If creating new member accounts: unique email addresses per account.

Permissions / IAM roles

You need IAM permissions in the management account to: – Create and manage an organization (Organizations APIs) – Create OUs, attach policies, and (optionally) create accounts – Create/assume roles for cross-account verification steps in this lab

AWS-managed IAM policies often used for learning/labs (review before use): – AWSOrganizationsFullAccess (broad) – Additional permissions for IAM and STS actions used in the lab (for example, assuming roles)

In production, prefer least privilege and separate roles for: – Org admins – Billing admins – Security admins – Account provisioning pipeline

Billing requirements

  • AWS Organizations itself is typically no additional charge, but member accounts can incur costs when services are used.

CLI/SDK/tools needed

  • AWS CLI v2 installed and configured on your workstation, or use AWS CloudShell.
  • AWS CLI install: https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html
  • Permissions to run aws organizations commands.

Region availability

  • AWS Organizations is a global service, but AWS Management Console still asks you to pick a Region; the org features are not Region-bound in the same way as compute/storage.

Quotas/limits

AWS Organizations has service quotas (examples include limits for number of accounts, OUs, SCP size, etc.). Do not rely on memory—check the current quotas here:
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_reference_limits.html

Prerequisite services (optional but common)

  • AWS CloudTrail for audit logging
  • AWS IAM Identity Center for workforce SSO across accounts
  • AWS Control Tower for landing zone automation (optional)

9. Pricing / Cost

Current pricing model (accurate, non-fabricated)

AWS Organizations is generally offered at no additional charge. You pay for the AWS resources and services you use in each account (and for any integrated services you enable).

Verify on the official pricing page (or Organizations product page links):
– AWS Organizations product page: https://aws.amazon.com/organizations/
– AWS Pricing Calculator: https://calculator.aws/#/

If pricing or special features change over time, verify the current model in official AWS pricing documentation.

Pricing dimensions

While AWS Organizations itself is typically free, your total cost is driven by: – Number of accounts (indirectly increases: – Logging costs (CloudTrail, S3 storage) – Security service costs (GuardDuty, Security Hub, etc.) – Compliance tooling costs (Config, etc.) – Policy-driven architecture decisions: – Centralized logging (S3, CloudWatch Logs, KMS) – Cross-account networking (Transit Gateway, VPC sharing, etc.) – Automation and operations: – CI/CD pipelines, configuration management, inventory tooling

Free tier

AWS Organizations is not commonly described with a “free tier” because it’s generally not billed directly. Your member accounts may use the AWS Free Tier for certain services depending on eligibility.

Hidden or indirect costs

  • CloudTrail: Organization-wide logging increases event volume and storage.
  • AWS Config: Multi-account compliance at scale can become a notable cost driver.
  • Security services: Enabling org-wide threat detection across accounts increases per-account/per-Region charges.
  • KMS: Encrypting centralized logs can add KMS request costs.
  • Data transfer: Centralized logging and cross-account architectures can create inter-Region or inter-AZ transfer costs (depending on design).

Network/data transfer implications

AWS Organizations doesn’t move your workload data. But the operating model it enables (central logs, central security, shared services) can cause: – Cross-account and cross-Region log delivery costs – VPC networking and routing costs (TGW, NAT, inter-Region peering, etc.)

How to optimize cost

  • Start with a minimal account set (for example: management, security, logging, shared services, workloads).
  • Use SCPs to reduce accidental spend (for example, blocking certain expensive services in sandbox).
  • Centralize logs, but apply lifecycle policies and retention aligned to compliance.
  • Use cost allocation tags and cost categories consistently from the start.

Example low-cost starter estimate (conceptual)

A learning setup can be near-zero incremental cost if you: – Create OUs and SCPs only (no workload resources) – Avoid enabling paid security services org-wide – Avoid storing logs for long periods

Costs appear when you create billable resources (EC2, NAT Gateways, extensive CloudTrail data events, Config rules, etc.).

Example production cost considerations

In production, your cost model typically includes: – Central logging storage + KMS encryption + lifecycle – Security tooling across accounts/Regions – CI/CD and shared services accounts – Networking hub/spoke and egress controls

Because pricing is Region- and usage-dependent, use the AWS Pricing Calculator and service pricing pages for each integrated service.

10. Step-by-Step Hands-On Tutorial

Objective

Create a basic multi-account governance structure with AWS Organizations: 1. Confirm or create an organization. 2. Create an OU structure. 3. Create a member account (or use an existing one). 4. Create and attach an SCP that restricts API calls to a single allowed Region (carefully designed). 5. Validate the SCP by attempting actions in allowed vs disallowed Regions. 6. Clean up.

This lab focuses on AWS Organizations itself (Management and governance). It avoids expensive resources and keeps risk low, but SCPs can break access if misapplied—follow the steps exactly and test on a non-production account.

Lab Overview

  • Environment: One management account + one member account.
  • Tools: AWS CLI v2 (CloudShell is fine).
  • Outcome: You will have:
  • An OU called Workloads-Lab
  • A member account placed into that OU
  • An SCP attached to that OU that denies actions in non-approved Regions (with safeguards)

Important: Region-restriction SCPs are subtle. This lab uses StringNotEqualsIfExists to avoid denying global services when the Region context key is absent. Always verify against official IAM condition key behavior.


Step 1: Configure AWS CLI and confirm identity

  1. Open AWS CloudShell in the management account, or use your local terminal with AWS CLI configured.

  2. Confirm who you are:

aws sts get-caller-identity

Expected outcome: You see the Account ID of your management account identity and an ARN for your IAM user/role.


Step 2: Check if AWS Organizations is already enabled

Run:

aws organizations describe-organization

Expected outcome: – If you already have an organization, you’ll see details including the organization ID (like o-xxxxxxxxxx) and feature set. – If you get an error such as AWSOrganizationsNotInUseException, then you don’t have an org yet.

If you don’t have an org, create one:

aws organizations create-organization --feature-set ALL

Expected outcome: The organization is created with ALL features enabled.

Notes: – AWS Organizations has two primary modes: consolidated billing only vs “All features.” Most governance features (like SCPs) require All features. – If you are adopting AWS Control Tower, it also expects an AWS Organizations foundation.

Verify:

aws organizations describe-organization

Step 3: Create an OU for the lab

  1. Get the Root ID:
aws organizations list-roots

Copy the Id value (example: r-xxxx).

  1. Create an OU named Workloads-Lab under the root:
ROOT_ID="r-xxxx"   # replace with your root id
aws organizations create-organizational-unit \
  --parent-id "$ROOT_ID" \
  --name "Workloads-Lab"

Expected outcome: You get an OU object with an Id like ou-xxxx-yyyyyyyy.

  1. Store the OU ID for later:
OU_ID="ou-xxxx-yyyyyyyy"  # replace with your OU id

Verify:

aws organizations list-organizational-units-for-parent --parent-id "$ROOT_ID"

Step 4: Create (or attach) a member account

You have two options:

Option A (recommended for a real test): Create a new member account

Creating accounts is realistic but can take time and requires a unique email address.

aws organizations create-account \
  --email "unique-email@example.com" \
  --account-name "org-lab-member-1" \
  --role-name "OrganizationAccountAccessRole"

Expected outcome: You get a CreateAccountStatus with an Id.

Account creation is asynchronous. Poll until it succeeds:

STATUS_ID="car-xxxxxxx"  # replace with the returned status Id
aws organizations describe-create-account-status --create-account-request-id "$STATUS_ID"

When status becomes SUCCEEDED, note the new AccountId.

List accounts to confirm:

aws organizations list-accounts

Option B: Invite an existing AWS account into the org

If you already have a separate AWS account you control, you can invite it:

aws organizations invite-account-to-organization \
  --target '{"Type":"ACCOUNT","Id":"123456789012"}' \
  --notes "Org lab invite"

Expected outcome: An invitation is sent. You must accept it from the invited account (console or CLI).
Acceptance is performed in the invited account (verify steps in official docs):
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_invites.html


Step 5: Move the member account into the OU

  1. Identify the member account ID (from Step 4). Set variables:
MEMBER_ACCOUNT_ID="123456789012"  # replace
  1. Determine the current parent of that account (often the root):
aws organizations list-parents --child-id "$MEMBER_ACCOUNT_ID"

Set:

CURRENT_PARENT_ID="r-xxxx"  # replace with the returned parent Id
  1. Move account into Workloads-Lab OU:
aws organizations move-account \
  --account-id "$MEMBER_ACCOUNT_ID" \
  --source-parent-id "$CURRENT_PARENT_ID" \
  --destination-parent-id "$OU_ID"

Expected outcome: No output on success.

Verify:

aws organizations list-accounts-for-parent --parent-id "$OU_ID"

Step 6: Create an SCP that restricts Regions (lab-safe pattern)

This SCP denies actions when the requested region is not us-east-1. It uses StringNotEqualsIfExists to reduce impact on global services.

  1. Create a policy document file deny-non-us-east-1.json:
cat > deny-non-us-east-1.json << 'EOF'
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "DenyRequestsOutsideUsEast1",
      "Effect": "Deny",
      "Action": "*",
      "Resource": "*",
      "Condition": {
        "StringNotEqualsIfExists": {
          "aws:RequestedRegion": "us-east-1"
        }
      }
    }
  ]
}
EOF
  1. Create the SCP in AWS Organizations:
aws organizations create-policy \
  --name "DenyNonUsEast1Lab" \
  --description "LAB: Deny API actions outside us-east-1 using RequestedRegion condition" \
  --type "SERVICE_CONTROL_POLICY" \
  --content file://deny-non-us-east-1.json

Expected outcome: Output includes a policy Id like p-xxxxxxx.

Set:

SCP_ID="p-xxxxxxx"  # replace

Step 7: Attach the SCP to the lab OU

Attach:

aws organizations attach-policy --policy-id "$SCP_ID" --target-id "$OU_ID"

Expected outcome: No output on success.

Verify attachment:

aws organizations list-policies-for-target --target-id "$OU_ID" --filter SERVICE_CONTROL_POLICY

Step 8: Validate by assuming into the member account and testing Regions

To test the SCP effect, assume the cross-account role in the member account (created by Organizations account creation flow if you used Option A; for existing accounts, ensure a role exists and trust is configured).

  1. Assume role:
ROLE_ARN="arn:aws:iam::${MEMBER_ACCOUNT_ID}:role/OrganizationAccountAccessRole"

aws sts assume-role \
  --role-arn "$ROLE_ARN" \
  --role-session-name "org-scp-lab"

Copy the returned AccessKeyId, SecretAccessKey, and SessionToken.

  1. Export temporary credentials (in the same shell):
export AWS_ACCESS_KEY_ID="ASIA..."
export AWS_SECRET_ACCESS_KEY="..."
export AWS_SESSION_TOKEN="..."
  1. Test an allowed Region action (example: list S3 buckets is global-ish; for a clearer region test, create a bucket in us-east-1 vs us-west-2).
    First, try creating an S3 bucket in us-east-1 (allowed). Bucket names must be globally unique—change the suffix:
BUCKET_ALLOWED="org-scp-lab-allowed-$(date +%s)"
aws s3api create-bucket \
  --bucket "$BUCKET_ALLOWED" \
  --region us-east-1

Expected outcome: Bucket creation succeeds.

  1. Now try creating a bucket in us-west-2 (should be denied by SCP). Again, use a unique name:
BUCKET_DENIED="org-scp-lab-denied-$(date +%s)"
aws s3api create-bucket \
  --bucket "$BUCKET_DENIED" \
  --region us-west-2 \
  --create-bucket-configuration LocationConstraint=us-west-2

Expected outcome: The request fails with an explicit deny. The error often indicates an authorization failure due to an explicit deny (from Organizations/SCP evaluation).

If you don’t see an explicit deny, confirm: – The account is in the correct OU – The SCP is attached to that OU – The organization is using “All features” – Your request really targets us-west-2


Validation

Use these checks back in the management account context (remove the temporary creds or open a new shell).

  1. Confirm the account’s parent OU:
aws organizations list-parents --child-id "$MEMBER_ACCOUNT_ID"
  1. Confirm SCPs attached to the OU:
aws organizations list-policies-for-target --target-id "$OU_ID" --filter SERVICE_CONTROL_POLICY
  1. Confirm the SCP content (fetch and review):
aws organizations describe-policy --policy-id "$SCP_ID"

You should see the JSON policy content you created.


Troubleshooting

Common issues and realistic fixes:

  1. AWSOrganizationsNotInUseExceptionCause: Organization not created yet. – Fix: Run create-organization --feature-set ALL in the management account.

  2. SCP seems to have no effectCause: The org might not have “All features,” the account isn’t in the target OU, or the policy isn’t attached. – Fix: Verify feature set with describe-organization, confirm OU placement with list-parents, and confirm attachment with list-policies-for-target.

  3. AssumeRole fails (AccessDenied)Cause: The role may not exist in the member account, or trust/permissions aren’t correct. – Fix: If you created the account via Organizations and specified --role-name OrganizationAccountAccessRole, it should exist. For invited accounts, create a cross-account role in the member account and allow the management account principal to assume it.

  4. Bucket creation fails in us-east-1Cause: Bucket name not unique or S3 policy restrictions. – Fix: Use a unique name; ensure you’re using correct regional parameters.

  5. You accidentally blocked needed actions with SCPCause: SCP denies too broadly. – Fix: Detach the SCP from the OU from the management account, or move the account out of that OU. Always test on non-prod first.


Cleanup

Cleanup is important to avoid confusion later.

  1. If still assumed into the member role, unset temporary credentials:
unset AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY AWS_SESSION_TOKEN
  1. Delete the S3 bucket created in us-east-1 (if created):
aws s3api delete-bucket --bucket "$BUCKET_ALLOWED" --region us-east-1
  1. Detach the SCP:
aws organizations detach-policy --policy-id "$SCP_ID" --target-id "$OU_ID"
  1. Delete the SCP:
aws organizations delete-policy --policy-id "$SCP_ID"
  1. (Optional) Move the member account back to root if desired:
aws organizations move-account \
  --account-id "$MEMBER_ACCOUNT_ID" \
  --source-parent-id "$OU_ID" \
  --destination-parent-id "$ROOT_ID"
  1. Delete the OU (must be empty):
aws organizations delete-organizational-unit --organizational-unit-id "$OU_ID"
  1. If you created a member account just for the lab: – You can remove it from the organization, but closing an AWS account is a separate process and has implications. Follow AWS official guidance for account closure and be cautious.

  2. If this entire organization was only for a lab and you want to delete it: – You must remove/close member accounts so only the management account remains, then delete the organization (verify exact requirements in official docs):
    https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_org_delete.html

11. Best Practices

Architecture best practices

  • Adopt a multi-account strategy early. Retrofitting governance into a single “mega account” is painful.
  • Use a standard OU layout aligned to business and risk:
  • Common pattern: Security, SharedServices, Workloads with sub-OUs like Prod, NonProd, Sandbox.
  • Prefer separate accounts for:
  • Logging (log archive)
  • Security tooling
  • Shared networking
  • CI/CD tooling
  • Keep the management account special: Use it primarily for organization management and billing, not for hosting workloads.

IAM/security best practices

  • Use AWS IAM Identity Center (where appropriate) for workforce access across accounts; avoid long-lived IAM users.
  • Least privilege for Organizations administration: Separate roles for:
  • Organization admins
  • Account provisioning operators
  • Security policy admins
  • Use SCPs as guardrails, not as your whole IAM strategy.
  • Test SCPs in a sandbox OU first. SCP mistakes can block business operations.

Cost best practices

  • Use multiple accounts to improve cost attribution.
  • Apply consistent tagging strategies and cost categories (outside Organizations itself).
  • Create sandbox accounts and use SCPs to reduce accidental high-cost provisioning (careful design required).
  • Centralize expensive tooling thoughtfully; evaluate per-account enablement costs.

Performance best practices

AWS Organizations is not a workload performance service. The key “performance” best practice is operational scalability: – Use automation (CLI/SDK/IaC) for repetitive organization tasks. – Avoid manual, one-off policy changes in production.

Reliability best practices

  • Treat org governance changes like production changes: reviews, approvals, rollback plans.
  • Use break-glass access patterns for emergencies (separate accounts/roles, strong MFA, auditing).

Operations best practices

  • Enable CloudTrail and log all Organizations changes.
  • Document OU/policy intent clearly (policy descriptions, internal docs).
  • Keep a policy repository (version control) for SCP JSON documents.
  • Use delegated admins for supported services instead of broad access to the management account.

Governance/tagging/naming best practices

  • Name OUs and accounts consistently:
  • prod-<app>, nonprod-<app>, shared-network, security-tooling, log-archive
  • Decide early whether OU structure maps to:
  • environments (prod/non-prod), or
  • business units, or
  • risk tiers
    Mixing all three without a plan can lead to confusion.

12. Security Considerations

Identity and access model

  • Organizations administration is controlled by IAM permissions in the management account.
  • SCPs affect what principals in member accounts can do (and can enforce preventive controls).
  • Use role-based access and federation for human access; minimize long-lived credentials.

Encryption

AWS Organizations doesn’t store your application data, so encryption topics mainly apply to what you build around it: – Encrypt centralized logs (S3 + KMS) in log archive accounts. – Encrypt security findings storage where applicable.

Network exposure

Organizations is accessed through AWS APIs. Your main exposure is: – Who can call Organizations APIs? – Who can change SCPs/OUs/accounts?

Restrict these actions heavily and require strong authentication.

Secrets handling

  • Don’t embed account access keys in automation. Use:
  • STS assume-role with short-lived credentials
  • IAM Identity Center for human access
  • Store sensitive automation secrets in AWS Secrets Manager or similar services, not in code repositories.

Audit/logging

  • Ensure CloudTrail logs Organizations actions.
  • Consider centralizing CloudTrail logs in a dedicated log archive account.
  • Monitor for changes to:
  • SCP attachments
  • account movement between OUs
  • delegated admin registration
  • trusted access enablement

Compliance considerations

Organizations helps implement preventive controls, but compliance requires broader controls: – Detective controls (Config, Security Hub, etc.) – Evidence retention (logs) – Separation of duties and access reviews

Common security mistakes

  • Using the management account for day-to-day workload operations.
  • Attaching overly broad “deny” SCPs to the wrong OU.
  • No break-glass path for production incidents.
  • Enabling service integrations/trusted access without security review.

Secure deployment recommendations

  • Implement a landing zone (AWS Control Tower or an equivalent custom design) for consistent baselines.
  • Separate duties across accounts and roles:
  • Security OU
  • Logging account
  • Shared services/networking account
  • Maintain policy-as-code for SCPs with peer review.

13. Limitations and Gotchas

Use these as a checklist before production rollout.

Known limitations / quotas

  • Limits exist for:
  • number of accounts per organization
  • number of OUs and nesting depth
  • number and size of policies (SCP size limits)
  • API request rates
    Check official quotas: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_reference_limits.html

Regional constraints

  • AWS Organizations is global, but the services you govern are regional. SCP “region restrictions” must be carefully designed and tested.

Pricing surprises (indirect)

  • Organizations itself is usually free, but org-wide enablement of:
  • CloudTrail data events
  • AWS Config rules
  • Security services
    can scale costs quickly across accounts and Regions.

Compatibility issues

  • Some AWS services integrate with Organizations only when:
  • “All features” is enabled
  • trusted access is enabled
  • delegated admin is configured
    Always follow the specific service’s setup guide.

Operational gotchas

  • SCP debugging can be difficult when multiple SCPs are inherited. Keep policies modular and well documented.
  • Account creation and moves may be eventually consistent—automation should retry.
  • Invited accounts require acceptance and may have constraints if they are already in another organization.

Migration challenges

  • Migrating from a single account to multi-account often requires:
  • refactoring IAM and CI/CD
  • redesigning networking
  • rethinking logging and incident response
  • Migrating existing independent accounts into one organization requires:
  • aligning guardrails
  • reconciling billing ownership
  • handling service-linked roles and delegated administration transitions

Vendor-specific nuances

  • The management account has special significance; avoid relying on assumptions. Confirm behaviors (especially around SCP effects and billing responsibilities) in official docs for your exact setup.

14. Comparison with Alternatives

AWS Organizations is the native AWS solution for multi-account management and governance. Alternatives are typically: – Other AWS governance services that complement Organizations – Equivalent constructs in other cloud providers – Self-managed processes (manual accounts, scripts) that don’t provide the same control-plane governance

Comparison table

Option Best For Strengths Weaknesses When to Choose
AWS Organizations Multi-account governance and billing on AWS Native integration, OU hierarchy, SCP guardrails, consolidated billing Requires planning; SCP mistakes can be disruptive Any serious multi-account AWS environment
AWS Control Tower Landing zone + guardrails + account factory Opinionated best practices; automates org setup; guardrails Less flexible than fully custom; adds operational model You want a standardized landing zone quickly
AWS IAM (single account) Small single-account setups Simple; fewer moving parts Doesn’t scale; weak isolation; no OU/SCP layer Only for very small or temporary environments
AWS Resource Access Manager (RAM) Sharing resources across AWS accounts Makes multi-account sharing easier Not a replacement for governance and billing Use alongside Organizations for cross-account sharing
Azure Management Groups + Azure Policy Azure multi-subscription governance Strong policy governance in Azure Different cloud, different primitives If your platform is Microsoft Azure
Google Cloud Organization/Folder/Projects + Org Policy GCP governance Strong org/folder policies in GCP Different cloud model If your platform is Google Cloud
Self-managed (manual multi-account) Very small setups avoiding centralized governance Low initial complexity Lacks centralized controls, error-prone Only if you cannot use Organizations (rare)

15. Real-World Example

Enterprise example: regulated company with strict governance

  • Problem: A financial services enterprise has 200+ AWS accounts across multiple teams. They need strict preventive controls, centralized audit logging, and separation of duties for compliance.
  • Proposed architecture:
  • AWS Organizations with OUs: Security, SharedServices, Workloads/Prod, Workloads/NonProd, Sandbox
  • Dedicated accounts:
    • log-archive (central S3 for CloudTrail/Config logs)
    • security-tooling (delegated admin for supported services)
    • network-hub (shared networking constructs)
  • SCPs:
    • Baseline at root: deny disabling essential logging/security baselines (carefully designed)
    • Prod OU: tighter restrictions (regions, approved services)
    • Sandbox OU: cost/risk containment guardrails
  • Why AWS Organizations was chosen: It’s the AWS-native governance layer that integrates with security and identity tooling and scales to hundreds of accounts.
  • Expected outcomes:
  • Reduced risk of unauthorized actions through SCP guardrails
  • Clearer audit and incident response via centralized logging
  • Faster account provisioning with consistent baselines

Startup/small-team example: fast-growing SaaS with cost visibility needs

  • Problem: A startup started in one AWS account. As customers and teams grew, billing became confusing and permissions got messy.
  • Proposed architecture:
  • AWS Organizations with OUs: Workloads, Sandbox
  • Accounts:
    • prod (production workloads)
    • nonprod (dev/test)
    • shared (CI/CD, container registry, shared tools)
  • Minimal SCPs:
    • Deny a short list of risky actions in nonprod/sandbox (tested)
  • Why AWS Organizations was chosen: Multi-account provides isolation and cost ownership without building a custom governance system.
  • Expected outcomes:
  • Clean separation between environments
  • Easier cost tracking per environment/team
  • Reduced chance of dev changes impacting production

16. FAQ

1) Is AWS Organizations the same as AWS Control Tower?
No. AWS Organizations is the core multi-account governance/billing service. AWS Control Tower builds on Organizations to provide an opinionated landing zone, guardrails, and account provisioning automation.

2) Do SCPs grant permissions?
No. SCPs only limit what permissions can be used in an account. IAM policies still must allow the action.

3) Can an SCP lock me out of an account?
It can block actions broadly and disrupt operations. Use careful testing, staged rollouts, and break-glass procedures.

4) Is AWS Organizations regional?
It’s generally treated as a global service, but the services you manage are regional and may behave differently by Region.

5) Do I need multiple AWS accounts?
Not strictly, but multi-account is a well-established AWS best practice for isolation, governance, and cost attribution.

6) What’s the “management account”?
The account that owns the organization and is responsible for organization administration and consolidated billing.

7) Can I change the management account later?
Changing payer/management arrangements is non-trivial and may have constraints. Verify current AWS-supported processes in official documentation if you need this.

8) What’s an OU used for?
To group accounts and apply policies (like SCPs) and governance consistently to that group.

9) How do invited accounts work?
You can invite existing AWS accounts to join your organization. They must accept the invitation, and there are constraints if they’re already in another organization.

10) Is AWS Organizations free?
AWS Organizations is typically no additional charge, but the services you enable and resources you run in member accounts are billed normally. Verify current pricing in official AWS sources.

11) How does AWS Organizations relate to IAM Identity Center?
Organizations provides the multi-account structure; IAM Identity Center can provide centralized workforce access into those accounts.

12) Should I run workloads in the management account?
Best practice is generally no. Keep it for org administration and billing; use separate workload accounts.

13) Can SCPs enforce tagging?
SCPs are not a general-purpose “tag enforcement engine.” Tag governance depends on AWS capabilities and services. Organizations may support tag-related policies depending on current features—verify in official docs.

14) How do I audit changes to OUs and SCPs?
Use AWS CloudTrail management event logs and centralize them for retention and monitoring.

15) What’s the fastest way to start with a secure multi-account setup?
For many teams, AWS Control Tower is the fastest standardized approach. If you need a custom landing zone, start with AWS Organizations plus a documented OU/policy model and strong logging/security baselines.

17. Top Online Resources to Learn AWS Organizations

Resource Type Name Why It Is Useful
Official documentation AWS Organizations User Guide – Introduction Core concepts, terminology, workflows
Official documentation AWS Organizations – Managing accounts Account creation/invites/moves in depth
Official documentation AWS Organizations – Policies and SCPs Authoritative SCP behavior and policy types
Official reference AWS Organizations service quotas/limits Prevent surprises when scaling
Official product page AWS Organizations product page High-level capabilities and official entry points
Official pricing AWS Pricing Calculator Estimate integrated service costs across accounts
Official IAM docs IAM JSON policy elements + condition keys Needed to write correct SCP patterns
Architecture guidance AWS Control Tower documentation How Organizations is used in landing zones
Videos AWS YouTube channel (search “AWS Organizations” and “SCP”) Walkthroughs and best practices from AWS
Community (reputable) AWS Blogs (search Organizations, SCP, multi-account) Practical patterns and design considerations

Helpful official URLs (entry points): – AWS Organizations docs: https://docs.aws.amazon.com/organizations/latest/userguide/ – Organizations limits: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_reference_limits.html – AWS Organizations product page: https://aws.amazon.com/organizations/ – AWS Pricing Calculator: https://calculator.aws/#/ – IAM policy reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements.html

18. Training and Certification Providers

Institute Suitable Audience Likely Learning Focus Mode Website URL
DevOpsSchool.com DevOps engineers, SREs, platform teams AWS governance, DevOps, automation, cloud operations Check website https://www.devopsschool.com/
ScmGalaxy.com Beginners to intermediate engineers DevOps fundamentals, tooling, governance basics Check website https://www.scmgalaxy.com/
CLoudOpsNow.in Cloud operations teams CloudOps, monitoring, governance operations Check website https://www.cloudopsnow.in/
SreSchool.com SREs and reliability-focused engineers Reliability, operations, incident response patterns Check website https://www.sreschool.com/
AiOpsSchool.com Ops teams adopting AI Ops AIOps concepts, automation in operations Check website https://www.aiopsschool.com/

19. Top Trainers

Platform/Site Likely Specialization Suitable Audience Website URL
RajeshKumar.xyz DevOps/cloud training content Engineers seeking structured guidance https://rajeshkumar.xyz/
devopstrainer.in DevOps training Beginners to advanced DevOps practitioners https://www.devopstrainer.in/
devopsfreelancer.com Freelance DevOps consulting/training Teams needing flexible coaching https://www.devopsfreelancer.com/
devopssupport.in DevOps support and training Ops teams needing hands-on help https://www.devopssupport.in/

20. Top Consulting Companies

Company Likely Service Area Where They May Help Consulting Use Case Examples Website URL
cotocus.com Cloud/DevOps consulting Multi-account design, governance, automation AWS Organizations OU/SCP design; landing zone planning; account vending pipelines https://cotocus.com/
DevOpsSchool.com DevOps and cloud consulting/training Governance, DevOps transformation, platform engineering Implement multi-account governance; CI/CD + IAM patterns; operational readiness https://www.devopsschool.com/
DEVOPSCONSULTING.IN DevOps consulting Cloud operations, security basics, automation Cloud governance enablement; policy-as-code processes; observability setup https://devopsconsulting.in/

21. Career and Learning Roadmap

What to learn before AWS Organizations

  • AWS fundamentals: IAM users/roles/policies, Regions/AZs, VPC basics, CloudTrail basics
  • AWS account security basics: MFA, root account protections, least privilege
  • Basic billing concepts: consolidated billing vs cost allocation tags, Cost Explorer

What to learn after AWS Organizations

  • AWS Control Tower (if you want a managed landing zone)
  • IAM Identity Center multi-account access patterns
  • Centralized logging architectures (CloudTrail org trails, S3 log archive patterns)
  • Multi-account security operations:
  • GuardDuty / Security Hub org administration (service-specific)
  • Incident response in a multi-account environment
  • Infrastructure as Code for governance:
  • SCP policy-as-code workflows
  • Account provisioning automation

Job roles that use it

  • Cloud Platform Engineer
  • Cloud/Solutions Architect
  • DevOps Engineer / SRE
  • Security Engineer / Cloud Security Architect
  • FinOps Analyst / Cloud Cost Manager
  • Cloud Operations Engineer

Certification path (AWS)

AWS Organizations appears as a concept across multiple AWS certification domains (governance, security, multi-account). A common progression: – AWS Certified Cloud Practitioner (foundations) – AWS Certified Solutions Architect – Associate – AWS Certified Security – Specialty (or equivalent, if current) – AWS Certified Solutions Architect – Professional

Always verify the latest AWS certification roadmap and exam guides on the official AWS Training and Certification site.

Project ideas for practice

  • Build a small landing zone:
  • OUs for prod/nonprod/sandbox
  • SCP baseline and environment-specific SCPs
  • Central log archive account pattern (design-only or implement with CloudTrail + S3)
  • Implement “account vending”:
  • Script account creation with AWS CLI and place accounts in correct OU
  • Add automated guardrails attachment
  • Create an SCP library:
  • region restriction (carefully)
  • deny disabling CloudTrail
  • deny leaving organization (where applicable—verify exact controls)

22. Glossary

  • Account: An AWS account; a strong isolation boundary for resources, IAM, and many service limits.
  • AWS Organizations: AWS service for multi-account management, governance, and consolidated billing.
  • Management account: The account that owns the organization and pays the consolidated bill.
  • Member account: Any account that belongs to an organization but is not the management account.
  • Organization: The overall container for accounts, OUs, and policies.
  • Root: The top-level node in the AWS Organizations hierarchy.
  • OU (Organizational Unit): A group of accounts used to apply and inherit policies.
  • SCP (Service Control Policy): A policy that limits the maximum permissions for accounts/OUs in an organization.
  • Policy attachment: The act of attaching a policy (like an SCP) to a root, OU, or account.
  • Inheritance: Policies attached to a parent (root/OU) apply to child OUs/accounts.
  • Delegated administrator: A member account authorized to administer certain AWS services across the organization (service-dependent).
  • Trusted access: An integration setting that allows an AWS service to operate with AWS Organizations across accounts.
  • Landing zone: A standardized multi-account baseline with governance, security, and networking patterns.
  • Break-glass access: Emergency access procedure (highly controlled) for critical incidents.

23. Summary

AWS Organizations is the core AWS Management and governance service for managing multiple AWS accounts with a centralized hierarchy, consolidated billing, and governance controls like Service Control Policies (SCPs). It matters because multi-account setups are a best practice for isolation, security, and scalable operations—and without a governance layer, multi-account environments become difficult to control.

Cost-wise, AWS Organizations is typically no additional charge, but it enables patterns (central logging, org-wide security tooling) that can materially affect your bill. Security-wise, it’s foundational: SCPs provide preventive guardrails, and delegated administration helps keep the management account tightly locked down.

Use AWS Organizations when you have (or expect) multiple AWS accounts and need consistent guardrails and billing governance. Your next learning step is usually either AWS Control Tower (for a managed landing zone) or a deeper focus on SCP design, identity federation/IAM Identity Center, and centralized logging and security operations across the organization.