Docs/Getting Started

Start here

Getting Started

This guide takes you from first login to operational readiness with traceable governance, actionable findings, and audit-grade evidence.

First setup

30-45 min

Primary role

Admin

Outcome

Baseline scan

Prerequisites

  • An active organization account and at least one Admin user.
  • Cloud credentials with read-only discovery permissions at minimum.
  • Network access from TurboFinOps worker/runtime to provider APIs.
  • Defined ownership model (who approves actions, who reviews findings).

Role Setup Plan

Admin

Initial setup, policy definition, integrations, and approvals.

FinOps

Cost findings triage, budgets, commitment decisions, and savings tracking.

Security

Security posture, region policy, and remediation governance.

Auditor

Evidence review, control traceability, and export validation.

Viewer

Read-only dashboards and posture visibility.

Step-by-step Setup

1. Complete organization onboarding

  • Sign in and create/join your organization.
  • Confirm organization context appears in dashboard header and settings.
  • Invite core operators (FinOps, Security, Auditor) from Settings > Users.

Validation: You can open dashboard pages without org re-creation prompts.

2. Register cloud connections

  • Open Connections and add AWS/Azure/GCP credentials.
  • Attach one or more scopes: account, subscription, or project.
  • Validate each scope is active and routable.

Validation: Connected scopes are listed and marked active.

3. Run baseline scan

  • Open Scans and trigger a full inventory scan.
  • Wait for completion and inspect resource/finding counts.
  • Re-run if provider rate-limit or temporary errors occurred.

Validation: Resources page and Findings page populate with current tenant data.

4. Configure governance and security defaults

  • Set required tags in Governance (owner, cost_center, environment at minimum).
  • Set allowed regions policy in Security.
  • Refresh compliance and verify SEC-GEO and GOV-TAG checks activate correctly.

Validation: Governance and Security dashboards show policy-aware metrics.

5. Enable operational workflows

  • Configure Jira/ServiceNow for ticketed remediation.
  • Configure notification channels for anomaly and policy events.
  • Set budget thresholds and forecast alerts.

Validation: Test events and sample tickets are delivered successfully.

6. Validate audit readiness

  • Open Audit and generate evidence bundle (JSON, PDF, XLSX).
  • Verify artifact metadata (timestamp, checksum, source snapshots).
  • Store first bundle as baseline for compliance cycle.

Validation: Auditor can export complete bundle with no permission gaps.

Go-live Checklist

  • At least one active scan completed for each connected provider.
  • Governance policy saved and compliance refreshed.
  • Region policy configured and enforced.
  • Action approval path tested (request -> approve -> execute -> audit).
  • At least one integration channel validated for alerts.
  • Audit bundle exported and reviewed by auditor role.

TurboFinOps

Start with one cloud scope. Prove savings fast.

Connect AWS, Azure, or GCP and get actionable findings, score trends, and auditable remediation paths in minutes.

Built for FinOps, governance and audit workflows