Skip to main content

AWS Organizational Policy Controls — interactive simulator

Interactive demo · Hands-on, no setup · Updated May 2026

Click a scenario in the diagram below and watch which gate blocks the request. AWS organizational policy is a layered system — Service Control Policies (SCPs), Resource Control Policies (RCPs), identity policies, resource policies, VPC endpoint policies — and each one closes a specific class of attack. The simulator makes the layering visible.

Try the four modes — Effective Permissions, Data Perimeter, SCP Demo, RCP Demo — to see how each policy type behaves.

How each policy type works

Four modes, explained.

Below is what's happening behind each tab in the simulator above, plus the AWS policy evaluation logic that ultimately decides whether a request goes through.

Effective permissions = the intersection of every layer

When a principal calls an AWS API, the request runs through a deterministic chain of policy checks. The simulator's "Effective Permissions" view shows the conceptual layering. The actual rule, simplified:

Explicit DENY anywhere wins. ALLOW must come from at least one applicable source. Anything outside what's allowed is an implicit deny.

The full evaluation chain

  1. 01Default deny — every request starts denied unless something allows it.
  2. 02Service Control Policies (SCP) attached to the principal's account/OU. If any SCP explicitly denies, request is denied. SCPs only filter; they don't grant.
  3. 03Resource Control Policies (RCP) attached to the resource owner's account/OU. Explicit deny here also wins. RCPs filter what can be done to resources owned by scoped accounts.
  4. 04Resource-based policy — if the resource has one (S3 bucket, KMS key, SQS queue, Secrets Manager secret). Explicit deny → denied. Explicit allow → contributes to allow.
  5. 05Identity-based policy — IAM policies attached to the user, role, or group making the call. Same rule: explicit deny wins; explicit allow contributes.
  6. 06Permission boundary — if attached to the principal, must explicitly allow the action; otherwise denied (acts as a ceiling).
  7. 07Session policies — if you used sts:AssumeRole with a session policy, it's another ceiling for this session.
  8. 08VPC endpoint policy — if the call goes through a VPC endpoint, the endpoint policy must allow it.

Cross-account calls add one more rule: both accounts have to allow it. The calling account's identity policy must allow the call, and the target account's resource policy (or SCP/RCP) must allow it from the external principal.

Why this matters: a single permissive IAM policy doesn't grant access on its own — it has to survive every other layer. That's why SCPs and RCPs are leverage: they live above IAM and can enforce invariants no individual team can override.

Want the full architecture story?

See how these policies close real attacks.

The simulator above shows the mechanics. The companion field guide walks through a live AI-driven AWS breach end to end — and maps each step of the attack to the architectural gap it exploits and the policy primitive that closes it.

Read the field guide →
About this guide

Built by the team at InstaSecure. We build a guardrails platform for AWS that operationalizes SCPs, RCPs, and data perimeter controls across an entire organization. The simulator and the underlying techniques are AWS-native — everything here is implementable without InstaSecure. If you'd like help operationalizing it, reach out.