How to
Set up trusted cloud connections and scopes so TurboFinOps can discover your inventory and generate findings. This guide covers AWS, Azure, and GCP.
Back to How To GuidesBefore connecting a provider, ensure the following:
TurboFinOps uses an IAM user with programmatic access. We recommend a dedicated read-only IAM user per account.
Step 1 -- Create an IAM user
Minimum required permissions
The following services are queried during a scan:
ec2:Describe*rds:Describe*eks:Describe*lambda:List*ecs:Describe*ecr:Describe*elasticloadbalancing:Describe*pricing:GetProductscloudwatch:GetMetricStatisticsUsing ReadOnlyAccess is the simplest approach for initial setup. Narrow permissions are recommended for production.
Step 2 -- Add the connection in TurboFinOps
TurboFinOps uses an Azure App Registration (service principal) with a client secret. This is the recommended approach for service-to-service authentication.
Step 1 -- Create an App Registration
Step 2 -- Assign Reader role to the service principal
Step 3 -- Add connection in TurboFinOps
TurboFinOps uses a GCP Service Account with a JSON key file. Create a dedicated service account per project for least-privilege access.
Step 1 -- Create a Service Account
Step 2 -- Add connection in TurboFinOps
A Scope is a single discoverable unit: one AWS account, one Azure subscription, or one GCP project. A connection can have multiple scopes. Each scope is scanned independently.
Note
At least one active scope is required before running a scan. Scans without active scopes produce no findings.
Problem: Credential validation fails immediately after saving
Fix: Double-check the key values for typos. For AWS, ensure the IAM user has programmatic access enabled (not just console access). For Azure, confirm the client secret has not expired. For GCP, ensure the JSON key file content was pasted in full.
Problem: Scan completes but Resource count is zero
Fix: Confirm the scope external ID is correct (Account ID / Subscription ID / Project ID). Check that the cloud account actually contains resources in the scanned regions. Verify the IAM role/service principal has read access to the resource types expected.
Problem: No findings after a successful scan
Fix: This is expected if all resources are correctly configured. Not all environments have active violations. Review the Resources page to confirm inventory was collected, and check the FinOps and Security dashboards for score context.
Problem: Scan jobs stuck in "running" for more than 10 minutes
Fix: This may indicate a provider API rate limit or a network timeout. Re-trigger the scan from Dashboard - Scans. If the problem persists, contact support with the scan job ID.
Problem: Azure scan fails with "insufficient privileges"
Fix: Ensure the App Registration has the Reader role assigned at the subscription level (not just resource group level). Role assignments can take a few minutes to propagate in Azure.
Still stuck? See the Troubleshooting guide or contact support@turbofinops.com.
TurboFinOps
Connect AWS, Azure, or GCP and get actionable findings, score trends, and auditable remediation paths in minutes.