Welcome to the second post in our six-part revision series for the AWS Certified Solutions Architect – Professional (SAP-C02) exam.
If networking is the backbone (Post 1), then AWS Organizations is the blueprint for a multi-account structure — enforcing security, compliance, and cost controls across your entire cloud estate. For SAP-C02, you’re expected to understand governance deeply, especially what controls can and cannot do.
Let’s break down the core concepts using a UK-wide enterprise analogy: a Head Office in London, with regional branches in Manchester and Edinburgh.
1. Organisational Units (OUs) & Policy Inheritance
Think of your AWS Organization as a UK holding company.
| Concept | AWS Key Point | UK Corporate Analogy |
|---|---|---|
| Hierarchy | AWS Organizations use a hierarchy: Root → OU → Account. SCPs attached at any level flow down to all child OUs and accounts. | London HQ defines company-wide rules that automatically apply to Manchester and Edinburgh offices beneath it. |
| Service Control Policies (SCPs) | SCPs are guardrails, not permissions. They define the maximum permissions that IAM users and roles can have. | Corporate policy caps what departments are allowed to do; individual job contracts (IAM policies) define day-to-day duties within that cap. |
| Effective Permissions | An action is allowed only if it is permitted by every applicable SCP from Root → OU → Account. The most restrictive result always wins. | If HQ bans one service, no regional office can use it — even if local management allows it. |
SAP-C02 Critical Detail: SCPs only apply when All Features are enabled in AWS Organizations.
2. Accounts: Management vs Member
Management Account (HQ Admin)
The management account is special and should be treated accordingly.
- Primary Use:
- Billing
- Creating and organising accounts/OUs
- Applying organisation-wide policies (SCPs)
- Best Practice:
- Do not deploy application workloads here. Keep it clean and locked down.
- Security Logging Exception:
- It is best practice to enable AWS CloudTrail and store organisation-level logs in the management account.
- Member accounts cannot delete or disable organisation trails stored here, protecting audit evidence.
Member Accounts (Regional Branches)
Accounts Created Within the Organization
- When you create an account via AWS Organizations, AWS automatically creates an IAM role called:
OrganizationAccountAccessRole - This role allows principals in the management account to assume administrator access into the member account.
Invited Accounts (Existing AWS Accounts)
- When you invite an existing AWS account:
- The management account does NOT automatically get admin access.
- The
OrganizationAccountAccessRoleis NOT created automatically.
- To gain admin access:
- You must manually create the
OrganizationAccountAccessRolein the invited account. - The role must trust the management account.
- You must manually create the
Exam Tip: This distinction between created vs invited accounts comes up frequently in SAP-C02 scenarios.
IAM Root User & SCPs
- IAM policies cannot be attached to a root user.
- SCP behaviour:
- SCPs do apply to the root user of member accounts.
- SCPs do NOT apply to the root user of the management account.
This is a common trap. Root users in member accounts are not immune to SCPs.
| Feature Mode | What You Get | SCP Support | SAP-C02 Relevance |
|---|---|---|---|
| Consolidated Billing (Legacy) | Centralised billing only | ❌ SCPs NOT supported | Know this mode exists — and its limitations |
| All Features | Full governance: SCPs, tag policies, backup policies, RAM integration | ✅ SCPs supported | This is what the exam assumes unless stated otherwise |

3. Governance & Management Tools
Large organisations don’t manage accounts manually — they automate.
| AWS Service | Function (SAP-C02 Focus) | Analogy |
|---|---|---|
| AWS Control Tower | Automates creation of a secure multi-account environment using AWS best practices. Applies preventive and detective guardrails to reduce configuration drift. | Automatically setting up a compliant Edinburgh branch that already follows London HQ’s governance standards. |
| AWS RAM (Resource Access Manager) | Securely shares AWS resources (e.g. Transit Gateways, subnets) across accounts or OUs. | Sharing a single high-speed network link from London HQ with Manchester, instead of building a new one. |
| CloudFormation StackSets | Deploys the same CloudFormation stack across multiple accounts and regions from a single operation. | Rolling out standard IAM roles or security tooling to every UK office in one go. |
Important Clarification:
AWS Control Tower does not automatically create IAM users or grant permissions inside member accounts. It governs the environment, not day-to-day access.
Quick Revision Checklist
- Management Account:
- Governance and billing in
- Application workloads out
- SCPs:
- Define maximum permissions
- Do not grant access
- Apply to member account root users
- Do not affect the management account
- Invited Accounts:
- Must manually create
OrganizationAccountAccessRole
- Must manually create
- AWS RAM:
- Used for sharing central resources like Transit Gateways and subnets
A solid grasp of AWS Organizations is foundational for solving multi-account, enterprise-scale scenarios in the SAP-C02 exam.
In the next post, we’ll move on to Data Storage and Database Solutions — where cost, performance, and durability trade-offs really start to bite.
References
- AWS Organizations – Service Control Policies
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html - SCP Evaluation Logic
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps_evaluation.html - Management Account Best Practices
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_best-practices_mgmt-acct.html - Accessing Member Accounts &
OrganizationAccountAccessRole
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html - Creating Cross-Account Roles for Invited Accounts
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_create-cross-account-role.html - AWS Control Tower Governance Overview
https://docs.aws.amazon.com/controltower/latest/userguide/orgs-guidance.html - Service Control Policies
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html
Catch up on the series:
- Last-Minute Revision for the Solutions Architect – Professional exam – Introduction
- AWS Organisations – this post
- Policies and Encryptions
- Data Storage
- Networking
- Serverless
- Final
