It is recommended to limit the maximum permission that can be granted by AWS IAM in your accounts at the organization level (or Org unit level), to enforce your security invariants (things you don’t want to allow in your organization and the rule doesn’t have frequent changes), These Permission Guardrails, can be enforced in AWS using Service Control Policies (SCPs). These policies do not grant any access, only limits the maximum effective permission.
SCPs can be applied to the whole organization, to a specific organizational unit or to a specific account:
And SCPs will restrict the effective maximum permission:
Therefore they are ideal to set up Security Invariants (the things that you want to set up and never change, or at least not frequently):
SCPs apply even the root user of the member accounts, but do not apply to the organizational management account (Organization root).
You can also apply a new type of permissions guardrail called Resource Control Policies (RCP). RCPs are resource-centric controls, that you can use to specify the conditions under which identities can access your resources centrally across resources in your organization. As SCPs, RCPs do not grant any permission, only limits the maximum permissions available for resources.
Think about everything that you never want it to happen in your accounts and enforce it through RCPs and SCPs.
AWS Organizations is a free service. Service Control Policies are free to use.