This content was provided as a Professional Contribution through the FinOps Certified Professional program.
Summary: Enforcing cloud governance requires more than just drafting rules: it demands a structured lifecycle to prevent breaking production environments. Practitioners should collaborate with stakeholders (like Security and Engineering) to define broad policy scopes—such as mandatory metadata—while carefully establishing exclusions for resources like Kubernetes that might be negatively impacted by aggressive “deny” rules. Roll out new policies in “Audit Mode” to validate their impact before moving to strict enforcement or automated remediation. By establishing a routine review cycle and tracking KPIs like the “Policy Compliance Rate,” organizations can shift from reactive cleanup to proactive, automated cost control.
You need Azure RBAC permissions in Azure Policy. The available permissions are:
The first step is to define who needs to be involved in the creation of a new policy. The FinOps Practitioner will define who are the key personas for defining the necessary policies, to present the risks and issues that arise from the policy, as well as justify its need.
Together with stakeholders, policies will be defined, and should consider the scope. Is highly recommended to define policies in broader scopes, to cover all child resources and facilitate the maintenance of the policy. In some cases, such as Azure, you can define a deletion sub scope, where the policy applied to a given scope in no longer applied.
Next, you need to define which business rules will be applied to non-compliant resources. They are:
Document the policy that will be implemented, and which resources will be affected by it. Depending on the context, two documents can be used: GMUD, for changing cloud environments that are already established and will undergo changes; or Implementation Plan, in the case of cloud environments without previously defined policies.
Both must possess the following requirements: scope, responsibilities, standards, compliance requirements, monitoring and enforcement. Regarding the content: timeline, resources required, assignees, dependencies, and risks associated with implementation.
It is also important to document a Test Plan, which can be carried out through audit effects rather than actions on non-compliant resources, to validate results and ensure that policy definitions are correct.
A Rollback Plan should also be established defining the procedures to be followed in case the changes need to be reversed due to unforeseen problems or failures during implementation. It must contain the conditions for triggering the rollback, detailed steps to revert the changes, responsible and schedule.
After the implementation of the Policies, the review and approval of the changes can be followed through a Post-Mortem Report evaluating the success of the change after its implementation and documenting the lessons learned.
In this report, the impact of the established policies on environmental governance is analyzed, compared with the initial objectives, any problems encountered and their respective solutions, as well as possible optimization actions.
After the implementation of the Policies, conduct regular compliance monitoring, ensuring adherence to the established policies. For this you can use cloud-native tools for automatic checks, scheduled manual audits and Compliance Reports with the results obtained.
It’s necessary to review and update policies frequently, so that they remain relevant and effective. Changes in architecture, changes in regulatory requirements and the Compliance Reports themselves can demonstrate the need to change or revise policies that where once necessary. To do this, establish a Policy Review Cycle, which can be semiannual or annual, following the previous step-by-step for any change made.
In the same way that new regulatory requirements may arise, giving rise to the update of a policy, it may be necessary to delete a policy to compliance. In other cases, an established policy may conflict with another because they cover the same resources. In theses cases, if it’s necessary to exclude a policy, the procedure of a GMUD must be followed, obtaining express authorization from the stakeholders directly affected and communicating the effectiveness of the change.
Once the environmental policies have been established, all stakeholders must be informed about the change in the environment that has taken place. When we talk about FinOps Policies, we expect that the new policies established and implemented will increase control over the resources created in the environment.
The idea is to optimize usage from implementation, avoiding the effort with corrective actions. The use of policy will ensure that engineering teams adhere to established standards from deployment to removal of a feature.
As mentioned above, take into account that some Deny Policies can impact the maintenance of resource environments such as Kubernetes and Azure Virtual Desktop.