How to completely lock down an AWS account with a service control policy (SCP)

Prevent usage of inactive accounts

Author's image
Tamás Sallai
5 mins

Cloud accounts are usually seen as machinery, humming away 24/7, working all the time to fulfill a business need. This is certainly true for production applications, but most workloads are not like this. A developer goes to an office in the morning, works until late afternoon then goes home. When he is not working, the account just sits there, doing practically nothing.

And this happens for longer periods of time too. Someone might be working on a project then moves to another one just to come back to the first one months later.

The problem is that these inactive accounts still have all the power of a normal account, and they significantly increase the attack surface. It doesn't matter if an account is unused for months if a misplaced access key leads that it starts mining Bitcoin.

It would be better to inactivate AWS accounts when they are not needed. Fortunately, it is possible with service control policies.

SCP

Service control policies (SCPs) allow outside control over the account. Because of this, this is the most powerful policy type in AWS as there is no way around them, even the root user is limited. When an SCP is in place there is no way to remove it or negate its effect without accessing the master account.

The SCP is a feature of AWS Organizations which is the service that allows creating multiple accounts without going through the usual process of registration. With Organizations, you can create a new account programmatically and it allows managing hundreds and thousands of accounts.

The account that has billing information filled in is called the master account. This is the one you created the traditional way and charges your bank card. The accounts created using Organizations are called member accounts. These are dependent on the master account for billing.

Organizations allow the master account to attach SCPs to member accounts to limit what they can do. These are IAM policies that are evaluated before anything else in the policy evaluation logic. With SCPs an account can be limited in which regions it can use resources, what services it can use, and even what resources it can not delete or modify.

Without access to the master account these policies can not be changed or removed. This makes SCPs a great tool to enforce limitations in an account. The master account can not be limited by an SCP.

Lockdown policy

To prevent an account from being used an SCP that denies everything can be used:

{
	"Version": "2012-10-17",
	"Statement": [
		{
			"Sid": "VisualEditor0",
			"Effect": "Deny",
			"Action": [
				"*"
			],
			"Resource": "*"
		}
	]
}

This puts an explicit deny on all actions on all resources, so everything that can be denied will be. Certain things like logging in or running the sts get-caller-identity can not be denied but everything related to resources can.

Note the policy ID as we'll need that to lock down an account:

Usage

Now that the account structure and the lockdown policy is ready, let's see how to use the AWS CLI to lock and unlock a member account!

Lock

Locking an account is attaching the lockdown policy to the account. Using the master account, use this call:

aws organizations attach-policy --target-id <account id> --policy-id <policy id>

This attaches the policy and that prevents anything from happening inside the account. No new instances can be run, no information can be queried about any resource inside it, even Lambda functions that are already added won't work. Here is how the IAM console looks like with an admin account:

And the best thing is that these restrictions also apply to the root user. In practice, as long as this policy is attached the account is unusable in any ways.

Unlock

To unlock the account and get back to normal all you need to do is detach the policy with the master account:

aws organizations detach-policy --target-id <account id> --policy-id <policy id>

Auto unlock and lock script

Let's bring this a step further! With some scripting it is possible to unlock the account for a shell session and auto-lock it when the session ends. Effectively, this setup minimizes the time the account is usable to when it's needed which is perfect for a development account.

Here's a simple script to achieve that:

aws organizations detach-policy --target-id $ACCOUNTID --policy-id $POLICYID || true

AWS_PROFILE=sandbox AWS_SDK_LOAD_CONFIG=1 zsh

aws organizations attach-policy --target-id $ACCOUNTID --policy-id $POLICYID

It unlocks the account then starts zsh. When the shell finishes by typing exit, the account gets locked automatically. Furthermore, it sets the AWS_PROFILE environment variable so that AWS CLI calls inside the shell session go to the member account. The AWS_SDK_LOAD_CONFIG is needed for the AWS SDK to support the profile setting.

A corresponding profile can be configured for the AWS CLI:

[profile sandbox]
role_arn = <role arn>
source_profile=default

The above setting works when you have a user specified in the credentials file. But in my case it used the AWS_ACCESS_KEY_ID, the AWS_SECRET_ACCESS_KEY, and the AWS_SESSION_TOKEN environment variables and this setup does not play well with profiles. When both the keys and the profile is set in the environment the former takes precedence and that prevents the jump into the account.

The solution is to create a temporary credentials file and unset the keys from the environment:

CRED_FILE=$(mktemp)
echo "[default]\naws_access_key_id=$AWS_ACCESS_KEY_ID\naws_secret_access_key=$AWS_SECRET_ACCESS_KEY\naws_session_token=$AWS_SESSION_TOKEN" > $CRED_FILE

aws organizations detach-policy --target-id $ACCOUNTID --policy-id $POLICYID || true

(
	unset AWS_ACCESS_KEY_ID
	unset AWS_SECRET_ACCESS_KEY
	unset AWS_SESSION_TOKEN

	AWS_SHARED_CREDENTIALS_FILE=$CRED_FILE AWS_PROFILE=sandbox AWS_SDK_LOAD_CONFIG=1 zsh
)
rm $CRED_FILE

aws organizations attach-policy --target-id $ACCOUNTID --policy-id $POLICYID

Conclusion

Service control policies are powerful security controls that are greatly underutilized. With some configurations, an account that is only usable when needed is possible, and a setup like this greatly improves security.

August 11, 2020
In this article