AWS Solution Architect Professional (SAP-C02) Review Material – AWS Organization, Control Tower and Billing & Cost Management

AWS Organization

  • helps you centrally manage and govern your environment
  • allows you to:
    1. Create Accounts
    2. Group Accounts
    3. Apply Policies
    4. Enable Services
  • Organization Structure:
    • Organization – a collection of AWS accounts that you can manage centrally and organize into a hierarchical, tree-like structure
    • Organizational unit (OU) – a group of AWS accounts within an organization. An OU can also contain other OUs enabling you to create a hierarchy.
    • Management account – is the AWS account you use to create your organization
    • Root – is contained in the management account and is the top-most container in your organization’s hierarchy.
    • Member account – is an AWS account, other than the management account, that is part of an organization
  • Feature Sets:
    1. All features (Recommended):
      • the default feature set can set central policies and configuration requirements
      • create custom permissions or capabilities
      • manage and organize your accounts under a single bill
      • delegate responsibilities to other accounts on behalf of the organization.
    2. Consolidated billing:
      • provide shared billing functionality
      • doesn’t include the more advanced features of AWS Organizations e.g. RCP and SCP
      • switching from Consolidated billing to All Feature:
        1. all invited member accounts must approve the change by accepting the invitation that is sent when the management account starts the process.
      • you cannot migrate from all features to consolidated billing after all features is enabled.
  • Authorization Policies:
    1. Service control policies (SCPs):
      • principal-centric controls
      • manage permissions in your organization
      • central control over the maximum available permissions for the IAM users and IAM roles in your organization i.e. defines a permission guardrail
      • do not grant permissions to the IAM users and IAM roles in your organization
      • there is no “Principal” element in the policy statement
      • default policy is FullAWSAccess
    2. Resource control policies (RCPs):
      • offer central control over the maximum available permissions for resources in your organization
      • ensure resources in your accounts stay within your organization’s access control guidelines
      • no permissions are granted by an RCP
      • defines a permissions guardrail, or sets limits, on the actions that identities can take on resources
      • there is a “Principal” element in the policy statement
      • default policy is RCPFullAWSAccess
  • Management Policies:
    1. Declarative Policies:
      • centrally declare and enforce your desired configuration for a given AWS service at scale across an organization
      • prevent noncompliant actions. For example:
        • block public internet access to Amazon VPC resources across your organization
        • control the discovery and use of AMI
        • controls if Amazon EBS snapshots are publicly accessible
    2. Backup Policies:
      • centrally manage and apply backup plans to the AWS resources across an organization’s accounts
      • gives granular control over backing up your resources at whatever level your organization requires
    3. Tag Policies:
      • standardize the tags attached to the AWS resources in an organization’s accounts
      • can specify that noncompliant tagging operations on specified resource types are enforced. In other words, noncompliant tagging requests on specified resource types are prevented from completing.
      • Untagged resources or tags that aren’t defined in the tag policy aren’t evaluated for compliance with the tag policy. 
    4. Chatbot Policies:
      • control access to your organization’s accounts from chat applications such as Slack and Microsoft Teams
    5. AI services opt-out policies:
      •  control data collection for AWS AI services for all the accounts in an organization.
  • Trusted Access:
    • enable a supported AWS service that you specify, called the trusted service, to perform tasks in your organization and its accounts on your behalf.
    • allows the trusted service to create a service-linked role in every account in your organization whenever that role is needed
    • Example of Trusted Service:
      • AWS Account Management
        • allow customers to programmatically modify their account information and metadata using their organization
        • if enabled, can enable/disable region

AWS Billing and Cost Management

  • can create a budget for the whole organization or per account.
  • Cost Explorer can be filtered by account in an organization (cannot filter by OU)
  • RI and Saving Plan Sharing:
    • activated/deactivated from Billing Preference

AWS Control Tower

  • Controls:
    • Mandatory:
      • owned by AWS Control Tower
      • applied to every OU on your landing zone.
      • applied by default when you set up your landing zone
      • can’t be deactivated.
    • Proactive:
      • check resources before they deployed
      • determine whether the new resources will comply with the controls that are activated in your environment.
      • scans your resources before they are provisioned, and makes sure that the resources are compliant with that control.
      • resources that are not compliant will not be provisioned.
      • implemented by means of AWS CloudFormation hooks and they apply to resources that would be provisioned by AWS CloudFormation. As a consequence, these controls may not affect requests that are made directly to services through some other means.
      • status of a proactive control is PASS, FAIL, or SKIP.
    • Preventive:
      • ensures that your accounts maintain compliance
      • disallows actions that lead to policy violations.
      • status of a preventive control is either enforced or not enabled.
      • supported in all AWS Regions.
      • implemented using service control policies (SCPs), or resource control policies (RCPs), each of which are part of AWS Organizations.
    • Detective:
      • detects noncompliance of resources within your accounts, such as policy violations, and provides alerts through the dashboard.
      • status of a detective control is either clearin violation, or not enabled.
      • implemented using AWS Config rules. 
      • apply only in those AWS Regions supported by AWS Control Tower.

Leave a Comment

Your email address will not be published. Required fields are marked *