Skip to content

Commit 24f1a82

Browse files
committed
add attaching policy step
1 parent 799d61d commit 24f1a82

File tree

1 file changed

+21
-0
lines changed

1 file changed

+21
-0
lines changed

content/blog/tag-strat-blog.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,27 @@ We created SCPs in AWS Organizations to prevent the creation of resources withou
151151
]
152152
}
153153
```
154+
### Step 3: Attaching the Service Control Policy and Tag Policy
155+
156+
After defining the policies, the next crucial step is to attach them to the appropriate Organizational Units (OUs) within AWS Organizations. By attaching both the Service Control Policy (SCP) and Tag Policy to the `Infraspec OU`, you ensure that all accounts under this OU enforce the mandatory tagging policy.
157+
158+
#### Attaching the Service Control Policy (SCP) to an OU
159+
160+
- **Navigate to the SCP Policy Section:**
161+
- Sign in to the AWS Management Console and go to the AWS Organizations console at [https://console.aws.amazon.com/organizations](https://console.aws.amazon.com/organizations).
162+
163+
- **Attach the SCP:**
164+
- Go to the `Service control policies` tab and click `Create policy` to define your SCP.
165+
- After creating the policy, click on `Targets` to attach it to the desired OU.
166+
167+
#### Attaching the Tag Policy to an OU
168+
169+
- **Navigate to the Tag Policy Section:**
170+
- Sign in to the AWS Management Console and go to the AWS Organizations console at [https://console.aws.amazon.com/organizations](https://console.aws.amazon.com/organizations).
171+
172+
- **Attach the Tag Policy:**
173+
- Go to the `Tag policies` tab and click `Create policy` to define your Tag Policy.
174+
- After creating the policy, click on `Targets` to attach it to the desired OU.
154175

155176
## Testing the Policy
156177

0 commit comments

Comments
 (0)