
Overview
A foundational element of a secure and cost-effective AWS environment is the proper configuration of AWS Organizations. This service is the central hub for managing multi-account strategies, but its effectiveness hinges on a critical setting: its feature set. AWS Organizations can operate in one of two modes—"Consolidated Billing Only" or "All Features." While the former offers basic financial aggregation, it lacks the necessary tools for robust governance.
The "All Features" mode unlocks the advanced capabilities required for true enterprise-level management. It is the prerequisite for implementing powerful preventative guardrails, most notably Service Control Policies (SCPs), which allow you to set permission boundaries for every account in your organization.
Without "All Features" enabled, your multi-account setup is merely a collection of loosely federated billing units, each operating with full autonomy. This creates significant security vulnerabilities and financial risks, as there is no central mechanism to enforce corporate standards, prevent costly misconfigurations, or ensure compliance at scale. This article explains why activating "All Features" is an essential step in maturing your cloud financial management and security posture.
Why It Matters for FinOps
Operating in "Consolidated Billing Only" mode introduces significant financial and operational risks. From a FinOps perspective, the lack of centralized control directly translates to wasted spend, increased security vulnerabilities, and operational drag. Without the ability to enforce preventative guardrails, teams are left in a reactive state, detecting cost overruns and security issues long after they occur.
The inability to use SCPs means you cannot prevent developers from spinning up resources in non-approved regions or using expensive, unvetted services. This leads to shadow IT and budget surprises. Furthermore, critical security infrastructure, like centralized logging, cannot be made immutable, exposing the organization to compliance violations and hindering forensic investigations. This fragmented approach is not scalable; it drives up operational overhead as security and finance teams must chase down policy violations in each account individually, stifling agility and innovation.
What Counts as “Idle” in This Article
While this article does not focus on idle compute or storage, it addresses a form of organizational idleness: a governance framework operating at minimum capacity. We define the "Consolidated Billing Only" mode of AWS Organizations as the problem state. In this mode, the organization’s potential for centralized governance is dormant.
An organization in this state is characterized by:
- Limited Authority: The management account can only aggregate billing and does not have administrative control over member accounts.
- Inability to Enforce Policy: Key governance tools like Service Control Policies (SCPs), Tag Policies, and Backup Policies are unavailable.
- Decentralized Security: Each member account retains full autonomy, creating a fragmented and inconsistent security landscape.
Identifying an organization in this "Billing Only" state is the first step toward activating the governance controls necessary to manage cloud spend and risk effectively.
Common Scenarios
Scenario 1
A company is scaling its multi-account strategy, creating separate AWS accounts for development, testing, and production. To maintain control, they need to ensure that production accounts have much stricter security policies than development accounts. With "All Features" enabled, they can apply restrictive SCPs to the Production organizational unit (OU) to block unapproved services and regions while allowing more freedom in the Development OU.
Scenario 2
A global enterprise must adhere to data residency regulations like GDPR, which restrict customer data from leaving specific geographic regions. Using SCPs, the central FinOps team can enforce a policy that denies actions like creating S3 buckets or launching EC2 instances in any AWS region outside of their approved European locations. This provides a technical enforcement layer for a critical legal requirement.
Scenario 3
A security operations team needs a complete and tamper-proof audit trail of all API activity across the entire organization. By activating "All Features," they can create an organization-wide AWS CloudTrail trail that sends logs from all member accounts to a central, highly secured S3 bucket. This trail cannot be disabled or modified by member accounts, ensuring the integrity of forensic data.
Risks and Trade-offs
Migrating from "Consolidated Billing Only" to "All Features" is a strategic decision that strengthens governance, but it requires careful planning. The primary risk is operational disruption if not managed correctly. The process requires explicit approval from the owner of every invited member account. Unresponsive account owners or lost credentials can stall the entire migration, leaving the organization in a partially governed state.
There is also a trade-off between speed and safety. Once "All Features" is active, new guardrails can be deployed. If these policies are rolled out too aggressively without proper testing or communication, they could inadvertently block legitimate business processes, breaking production workflows. The goal is to enhance control without hindering developer agility, which requires a phased approach to policy implementation.
Recommended Guardrails
Activating "All Features" is the first step; the next is to implement a framework of preventative guardrails. This moves your FinOps practice from reactive reporting to proactive governance.
Start by establishing clear policies for resource tagging and ownership, ensuring every resource can be attributed to a team or cost center. Use Tag Policies to enforce these standards automatically.
Implement SCPs as your primary preventative control. Begin with broad guardrails, such as restricting deployment to approved AWS regions, preventing the deletion of critical logging configurations, and blocking access to expensive or unapproved services. Establish an approval flow for policy changes to ensure they are vetted before deployment. Finally, integrate AWS services like AWS Budgets and AWS Cost Anomaly Detection at the organizational level to create alerts that notify teams of potential overspending before it becomes a major issue.
Provider Notes
AWS
Enabling "All Features" is the key that unlocks the full suite of governance services within the AWS ecosystem. The foundational service is AWS Organizations, which provides the framework for managing multiple accounts. The most powerful tool unlocked by this mode is Service Control Policies (SCPs), which act as preventative guardrails for permissions. This mode also enables centralized, immutable logging through organization-wide AWS CloudTrail trails and allows for consistent compliance monitoring at scale with AWS Config conformance packs.
Binadox Operational Playbook
Binadox Insight: Shifting to "All Features" in AWS Organizations transforms your FinOps strategy from being purely detective to being preventative. It allows you to build a secure framework where developers have freedom to innovate, because the most damaging and costly actions are blocked by default at the account boundary.
Binadox Checklist:
- Verify your AWS Organization’s current feature set in the management account console.
- Communicate the plan and benefits of migrating to "All Features" with all member account owners.
- Initiate the migration process and track the approval status from each invited account.
- Once enabled, immediately activate and configure Service Control Policies.
- Start by deploying foundational SCPs, such as protecting root user credentials and restricting unused regions.
- Integrate key services like AWS CloudTrail and AWS Config at the organizational level for centralized visibility.
Binadox KPIs to Track:
- Migration Progress: Percentage of member accounts that have approved the transition to "All Features."
- Policy Adoption: Number of preventative SCPs deployed and attached across your organizational units.
- Compliance Score: Reduction in configuration policy violations reported by tools like AWS Config.
- Mean Time to Prevention: Shift from measuring detection time to confirming that risky configurations are actively prevented.
Binadox Common Pitfalls:
- Lack of Communication: Failing to get buy-in from member account owners, causing the migration process to stall indefinitely.
- Overly Restrictive Policies: Deploying SCPs that are too strict without proper testing, leading to broken applications and frustrated developers.
- Forgetting Post-Migration Steps: Assuming the work is done after enabling "All Features" and failing to configure SCPs and other service integrations.
- Ignoring Unresponsive Accounts: Allowing a few unmanaged or abandoned accounts to block the entire organization’s security uplift.
Conclusion
Moving your AWS Organization to the "All Features" set is not a minor administrative tweak; it is a fundamental step toward building a mature, secure, and cost-efficient cloud practice. It provides the technical foundation for scalable governance, enabling you to enforce financial and security policies proactively rather than cleaning up mistakes after the fact.
For any organization serious about FinOps, activating these capabilities is non-negotiable. It allows you to build a framework of safety and control that empowers your teams to innovate quickly while protecting the business from unnecessary risk and runaway costs. The transition requires careful planning and coordination, but the resulting gains in security, compliance, and operational efficiency are immediate and essential for success at scale.