This SCP prevents users or roles in any affected account from deleting KMS keys, either directly as a command or through the console.

See Related Configuration Items for a Configuration Package to deploy multiple SCPs to an AWS Account.

Configuration template includes a CloudFormation custom resource to deploy into an AWS account.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Action": [
                "kms:ScheduleKeyDeletion",
                "kms:Delete*"
            ],
            "Resource": "*",
            "Effect": "Deny"
        }
    ]
}

Actions



Customize Template

No policy variables to customize
* Required field