How to
Convert a finding into an approved and auditable remediation with minimal risk.
Back to How To GuidesAllowed roles: Admin, FinOps, Security. Action requests go through conflict checks, and most actions default to manual approval mode.
Admin
Can approve or reject actions and override policy when explicitly allowed.
FinOps
Can request cost remediation and review projected savings.
Security
Can request exposure and control-gap remediation.
Before execution, TurboFinOps checks for IaC ownership tags, freeze windows, policy protection flags and ticket requirements. If a conflict is detected, the action is blocked or sent back for explicit Admin review depending on organization policy.
IaC ownership
Resources tagged as managed by Terraform, Pulumi or another IaC tool should usually be fixed in source control.
Freeze window
Production or audit freeze periods prevent accidental changes during sensitive windows.
Policy protection
Critical resources can be protected from automated mutation even when a finding exists.
Ticket requirement
Some actions may require a Jira or ServiceNow reference before approval.
For compatible actions, rollback plans are attached to execution records. Use rollback controls from `Actions` page to restore previous state when needed.
TurboFinOps
Connect AWS, Azure, or GCP and get actionable findings, score trends, and auditable remediation paths in minutes.