đŸ•šī¸
Ghoulsec Vault
Website Toolbase
  • Welcome !
  • đŸ—ƒī¸Exam Prep Notes
    • 📔CEH V13 (Master Edition)
      • Module 02: Footprinting and Reconnaissance
      • Module 03: Scanning Networks
      • Module 04: Enumeration
      • Module 05: Vulnerability Analysis
      • Module 06: System Hacking
      • Module 07: Malware Threats
      • Module 08: Sniffing
      • Module 09 : Social Engineering
      • Module 10: Denial of Service
      • Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls , Honeypots
      • Module 13: Hacking web servers
      • Module 14: Hacking Web Applications
      • Module 15:SQL Injection
      • Module 16: Wireless Attacks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT & OT Hacking
      • Module 19 : Cloud Computing
      • Module 20 : Cryptography
    • 📘ISC2 -Certified in Cyber Security
      • Chapter -1 Security Principals
      • Chapter -2 Disaster Recovery,Business Continuity & Incident Response
      • Chapter -3 Access Control Concepts
      • Chapter -4 Network Security
      • Chapter -5 Security Operations
    • 📗AZ - 900
      • Basics of Cloud Computing
        • Economic of Scale
        • CapEx & OpEx
        • Consumption based model
        • Cloud Deployment Models
        • Shared Responsibility Model
        • Data centers, Regions & Availability Zones & Geographyies in Azure
        • Resources & Resource Group
        • Azure Access Tools
        • Azure Service Lifecycle
        • Azure SLAs
        • Azure Cloud Adoption Framework
      • Azure Services
        • Azure Computing Services
        • Azure Networking Services
        • Azure Storage Services
        • Azure Database Service
        • Azure Marketplace
        • Big Data & Azure
        • Azure Serverless Computing
        • IoT & Azure
        • Other Azure Services
        • Azure Resource Locks & Resource Tags
        • Azure Security Services
          • Security Groups
          • Routing Tables
          • Azure Firewall
          • Azure DDOS Protection
          • Azure Identity & Access Management (Azure AD)
          • Azure RBAC
          • Azure Security Center
          • Azure Key Vault
      • Azure policies & Blueprints
      • Azure Cost Management
      • Azure Core Tenents
    • 📗SC - 900
      • Zero Trust Model
      • Shared Responsibility Model
      • Defense in Depth
      • Security Controls
      • CIA Triad
      • Encryption / Hashing / Signing
      • Microsoft Security & Compliance Principals
      • Common Identity Attacks
      • Microsoft Identity as Primary Security Perimeter
      • Modern Authentication with Azure AD
      • Azure AD Identity Types
      • Azure External Identities
      • Hybrid Identities
      • Authentication Methods & Password Protection
      • Conditional Access
      • Azure AD Roles & RBAC
      • Governance in Azure AD
      • Azure Identity Protection
      • Azure NSG, DDOS, Firewall
      • Azure Bastion & Keyvault
      • Azure Encryption
      • Azure CSPM
      • Azure Security Center
      • Azure Defender
        • Microsoft O365 Defender
        • Azure Sentinel
      • Microsoft Cloud App Security
      • Microsoft Intune
      • Microsoft Complaince Manager
      • Information Protection
      • Microsoft insider risk capabilities
    • 📔AWS Cloud Practitioner
      • Cloud Deployment
        • AWS Global Infrastructure
      • AWS Cloud Essentials
        • AWS SNS
          • AWS SQS
      • AWS Compute & Container Services
        • AWS EC2
          • Elasticity & Agility
        • AWS Serverless Computing
        • AWS Container Services
        • AWS Beanstalk
        • AWS Load Balancing
      • AWS Storage & Databases
      • AWS Networking
      • AWS Security
        • AWS Organisation
        • AWS Compliance
        • AWS DDOS
        • Additional Security Services
      • AWS Monitoring & Analytics
        • Other Analytics Services
      • AWS Pricing & Support
      • AWS Migration & Innovation
        • Migration Statergies
        • AWS Snow Family
        • AWS Transfer Family
        • Innovation on AWS
      • AWS Well Architecture Framework
      • Other AWS Services
  • 🧑‍đŸ’ģCyber Security Base
    • Ghoul's Den
    • Cheatsheets
    • SSL Handbook
      • Installing OpenSSL
      • Encrypting Web Servers using SSL
      • Compiling .pfx file using openssl
      • De-compiling .pfx file
      • Zimbra Mail Server SSL renew
      • SSL Certificates
    • â˜ī¸Cloud Security
      • Amazon Web Services (AWS)
        • AWS - IAM & Policy Management
        • AWS Organization
        • AWS - Roles (Assume Role)
        • AWS - EC2 (Elastic Computing)
        • AWS - VPC
        • AWS - Bastion Host
        • AWS Application Load Balancer
        • AWS Auto Scaling Group
        • AWS WAF
        • AWS - VPC Peering
        • AWS Transit Gateway
        • AWS NAT Gateway
        • AWS - Route 53
        • AWS Certificates Manager
        • AWS Network Load Balancer (NLB)
    • đŸ•¸ī¸Network Security
      • Firewalls
        • Sophos - Security Suite
          • Sophos Firewalls
      • VPN
        • VPNs
          • Wireguard Tunneling
          • StrongSwan Gateway VPN Server on Ubuntu
      • IP Address and IP Subnetting
      • Basic to Advance Networking Materials
    • 🧑‍đŸ’ģVAPT
      • Sample Report Templete
      • OWASP
        • OWASP Web Application Security & WebGoat
      • Web Application testing checklist
        • Client Side Penetration Testing
          • Clickjacking
          • Websockets
          • CSRF
          • XSS Filters
        • Server Side Penetration Testing
        • Advanced Web Application Pentesting
          • OAuth
          • JWT Injection
          • Server Side Templete Injection
    • â˜„ī¸GRC
      • ISMS AUDIT PLAN
      • CIS Compliance Windows
    • 🔍Forensic
      • Forensic Tools
      • EMAIL Forensics
      • File header forensics
    • Trend Micro
      • Deep Security
        • Installation & Prerequisite
          • Microsoft SQL server 2022
          • Postgres 16 Core
          • Installation
    • Practical Malware Analysis & API Threats
  • đŸ•šī¸Server are fun !
    • Securing Linux
      • Securing SSH
      • Sudoers
      • UFW (Uncomplicated FW)
      • Unattended Upgrades
      • Password Complexiety
      • Auditing Linux
      • Samba - SMB
      • NFS - Network File System
      • FTP
      • AIDE
    • Servers
      • Linux Sever
        • OpenLDAP Server Setup
          • ldap-account-manager
          • Securing OpenLDAP
          • OpenLDAP client setup
          • Checking LDAP setup
        • Users & Groups
        • Password Policy
        • File & File Permissions
        • Automatic Updates
        • Adding GUI to Ubuntu Server
        • DNS Server
        • NTP Server
      • Windows Sever
        • Deep dive into Windows Server
        • Windows server Installation
        • Disable IPv6
        • Disable Server Manager on startup
        • Promoting OS to AD server
        • AD DNS
        • AD DHCP
        • AD Activation
        • AD Users & Groups
        • AD FileServer
        • Adding Users into AD
        • Bulk Importing users into Domain
        • Windows AD Resources
        • Group Policy Editor
          • Creating First Policy
          • Restricting CMD & Powershell
          • Password Policies
          • Audit Policies
          • Log Retention Policy
          • Windows Defender Firewall
          • Patch Management & Window Updates
        • Setting Up local accounts for windows hosts
    • Hacking Systems
      • Linux Systems
        • Battery Charge Threshold (Linux)
        • Metasploitable OS Complete Solved
      • Tricking Windows
        • Bitlocker & Time based policy bypass
    • Monitoring HeartBeats
    • RAID Technology
    • Managing Partitions
      • Parted
      • Fdisk
      • LVM
        • Re-claiming unused disk space
        • Adding physical volume into VG
        • Removing physical volume from VG
      • SWAP Memory
    • Virtualization
      • Proxmox
        • Proxmox VE Installation
        • Default Storage Expansion
        • Proxmox Network Link Aggegration
        • NAT Interface Configuration
        • Importing disk into proxmox
        • Creating an LVM Thin Pool
        • Proxmox IAM
  • đŸ™â€â™‚ī¸Dan the AI Expert
    • Ollama Ollama ...
      • Ollama
        • Ollama models
        • Open Web UI & Ollama Integration
    • Microsoft Presentation using AI
  • đŸ›Ąī¸Security Operations
    • Wazuh - Open Source XDR. Open Source SIEM.
      • Components
      • Deployment Methods
      • Installation
        • Single Node Installation
          • Wazuh Indexer Installation
          • Wazuh Server Installation
          • Wazuh Dashboard Installation
          • Single node deployment with Script
        • Managing multiple Wazuh clusters with Cross-Cluster Search
          • Cluster Configuration
          • Set up Cross-Cluster Search
        • Upgrading Wazuh Central Components
        • Uninstalling Wazuh
      • Custom Decoder & Rules
        • Pfsense Decoders
        • Pfsense Rules
      • Security Operations Center Tools (Wazuh)
    • IRIS-DFIR / Case Management
    • Graylog & ElasticSearch
    • Zabbix NMS
      • Zabbix Installation
      • Zabbix Database Management
        • Zabbix Database backup
        • Zabbix Database restore
        • MySQL Replication (M-M)
        • MySQL Replication (M-W)
      • Zabbix Geomap Setup
      • Adding Hosts into Zabbix
      • Zabbix Hostgroups
      • Auto Registration Hosts Zabbix
      • Zabbix Globalscrips
      • Zabbix HA Cluster
      • Zabbix Proxy
      • Zabbix Notifications
      • Zabbix Maintainance
      • Zabbix User Management & Authentication
      • Zabbix Housekeeping
      • Scheduled Reporting
      • Service Monitoring using Zabbix
  • Git the master!!
    • Configuring git
    • Git Branches
    • Undoing changes
    • Git - Cheat sheet
    • My first git...
Powered by GitBook
On this page
  • Overview
  • Prerequisites
  • Creating an AWS Organization
  • Managing Accounts in AWS Organizations
  • Organizational Units (OUs)
  • Service Control Policies (SCPs)
  • Consolidated Billing
  • Resource Sharing in AWS Organizations
  1. Cyber Security Base
  2. Cloud Security
  3. Amazon Web Services (AWS)

AWS Organization

PreviousAWS - IAM & Policy ManagementNextAWS - Roles (Assume Role)

Last updated 3 months ago


Overview

AWS Organizations is a service that allows you to manage multiple AWS accounts centrally. It helps you manage billing, control access, and automate workflows across multiple accounts, all while ensuring you maintain a secure and well-organized environment. AWS Organizations enables you to set up and manage accounts into a hierarchical structure, enforce policies, and simplify billing.

Key Features of AWS Organizations:

  • Account Management: Organize accounts into a hierarchical structure with organizational units (OUs).

  • Service Control Policies (SCPs): Set permission guardrails to restrict access to AWS services and resources across your organization.

  • Consolidated Billing: Combine multiple AWS accounts to receive a single bill, while still maintaining separate accounts for financial and operational purposes.

  • Resource Sharing: Share resources across multiple accounts.

  • Cross-account Access: Easily configure access for users or roles to multiple accounts.

  • Automated Account Creation: Automate the process of creating and managing AWS accounts within your organization.

Prerequisites

  • Root User Access: To create or manage an AWS Organization, you must be signed in with an AWS root user or an IAM user with appropriate permissions.

  • AWS Organizations Service: Ensure AWS Organizations is supported and available in your region.

Creating an AWS Organization

Step 1: Sign in to the AWS Management Console

  1. From the Services menu, search for and select AWS Organizations.

Step 2: Create an Organization

  1. In the AWS Organizations console, select Create organization.

  2. Choose the All features option, which enables the full set of AWS Organizations capabilities, including account management, consolidated billing, and service control policies.

  3. Click Create organization.

Step 3: Organize Accounts

  1. Once the organization is created, you can begin adding new accounts or inviting existing accounts to join your organization.

  2. To add an account, select Accounts from the left sidebar, then click Add account. You can either create a new AWS account or invite an existing one by email.

  3. Assign the new account to an Organizational Unit (OU), which helps organize your accounts in a structured manner.


Managing Accounts in AWS Organizations

Step 1: Create New Accounts

  1. From the AWS Organizations console, go to Accounts.

  2. Click Add account.

  3. Select Create an AWS account.

  4. Provide the email address, account name, and IAM role name.

  5. Optionally, select an Organizational Unit (OU) for the account.

  6. Click Create to create the new account.

Step 2: Invite Existing Accounts

  1. In the Accounts section of the AWS Organizations console, click Add account.

  2. Select Invite an existing account.

  3. Provide the email address of the account owner you want to invite.

  4. The account owner will receive an invitation to join your organization.

  5. After they accept the invitation, their account will be linked to your organization.


Organizational Units (OUs)

Organizational Units (OUs) allow you to group accounts in a way that matches your company’s structure. For example, you can create OUs for different departments like Finance, Development, or Marketing.

Step 1: Create an Organizational Unit

  1. In the AWS Organizations console, navigate to Organizational units.

  2. Click Create organizational unit.

  3. Provide a name for the OU (e.g., Development).

  4. Click Create.

Step 2: Move Accounts Between OUs

  1. In the Accounts section, select the account you want to move.

  2. Click Move.

  3. Choose the target Organizational Unit and click Move.


Service Control Policies (SCPs)

Service Control Policies (SCPs) are a powerful feature of AWS Organizations that allow you to set permission guardrails for your accounts and OUs. SCPs help you control which services and actions are available to IAM users and roles in your accounts.

Step 1: Create a Service Control Policy

  1. From the AWS Organizations console, navigate to Policies.

  2. Click Create policy.

  3. Write your SCP using JSON to define the allowed or denied services and actions. For example, to deny access to Amazon S3, use:

    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Deny",
          "Action": "s3:*",
          "Resource": "*"
        }
      ]
    }
  4. Click Create policy to save.

Step 2: Attach an SCP to an Organizational Unit or Account

  1. Go to the Organizational units or Accounts tab.

  2. Select the OU or account to which you want to attach the SCP.

  3. Click Attach policy and choose the policy you created.

  4. Click Attach.


Consolidated Billing

AWS Organizations enables Consolidated Billing, allowing you to combine the usage from multiple AWS accounts into one bill. This can result in lower costs by taking advantage of volume discounts.

Step 1: Enable Consolidated Billing

  1. In the AWS Organizations console, navigate to Billing.

  2. Choose Consolidated Billing from the left sidebar.

  3. Ensure that Consolidated billing is enabled, which automatically aggregates billing for linked accounts.

Step 2: View Consolidated Billing Reports

  1. From the AWS Billing and Cost Management Console, go to Bills.

  2. You can view detailed billing information, including usage across all accounts in your organization.


Resource Sharing in AWS Organizations

You can share resources such as Amazon VPC subnets, AWS RAM (Resource Access Manager), and AWS Transit Gateway across multiple accounts in your organization.

Step 1: Enable Resource Sharing

  1. In the AWS Organizations console, go to Resource Sharing.

  2. Click Create resource share and select the resources you want to share (e.g., VPCs, Subnets).

  3. Select the accounts or OUs with which you want to share the resources.

  4. Click Create.

Step 2: Accept Resource Share Invitations

  1. The recipient account will receive an invitation to accept the shared resources.

  2. They can go to the Resource Share section in their AWS console to accept or decline the invitation.

Go to the and sign in using your root user or an IAM user with appropriate permissions.

🧑‍đŸ’ģ
â˜ī¸
AWS Management Console
AWS Organizations Dashboards - Block Diagram