Deny user access with Service Control Policies - Amazon IAM Identity Center
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Deny user access with Service Control Policies

To immediately deny access to make authorized API calls when an IAM Identity Center user's access is disabled or the user is deleted, you can:

  1. Add or update the inline policy of the permission set(s) assigned to the user by adding an explicit Deny effect for all actions on all resources.

  2. Specify the aws:userid or identitystore:userid condition key.

Alternatively, you can use a Service Control Policy to deny the user's access across all member accounts in your organization.

Example SCP to deny access

This denial policy blocks all Amazon actions for a specific user, regardless of other permissions they might have been granted elsewhere. This policy overrides any Allow policies.

JSON
{ "Version":"2012-10-17", "Statement" : [ { "Effect": "Deny", "Action": "*", "Resource": "*", "Condition": { "StringLike": { "aws:UserId": "*:deleteduser@domain.com" } } } ] }
JSON
{ "Version":"2012-10-17", "Statement" : [ { "Effect": "Deny", "Action": "*", "Resource": "*", "Condition": { "StringEquals": { "identitystore:UserId": "DELETEDUSER_ID" } } } ] }