๐Ÿ”ด 10 Critical Issues
Live ยท March 2026
๐Ÿ””
7
๐Ÿท๏ธ
Poor Tagging & Cost Attribution
Missing or inconsistent tags make it impossible to allocate costs to projects, teams, or environments โ€” rendering chargeback and executive reporting unreliable.
Untagged Resources
2,847
โ–ฒ 12% this week
Unallocated Cost
$341K
โ–ฒ 8% vs last month
Tag Coverage
47%
โ”€โ”€ Target: 95%
Chargeback Ready
31%
โ–ฒ 4% this month
Teams Affected
14
โ”€โ”€ Across 4 clouds
Filter
โ˜๏ธ AWS โ€” 1,240 untagged
โ˜๏ธ Azure โ€” 890 untagged
โ˜๏ธ GCP โ€” 512 untagged
โ˜๏ธ OCI โ€” 205 untagged
Tag Coverage by Cloud
% resources tagged
Unallocated Cost Trend
Last 6 months
Top Untagged Resource Types
by cost impact
Resource Type Cloud Count Monthly Cost Coverage
EC2 Instances AWS 438 $82,400
28%
Virtual Machines Azure 312 $61,200
41%
EBS Volumes AWS 890 $34,600
55%
Compute Instances GCP 274 $28,900
62%
RDS Instances AWS 142 $19,800
74%
Active Alerts
Tagging issues
438 EC2 instances missing cost-center tag
AWS us-east-1 โ€” $82,400/mo unallocated
2h ago
No tagging policy enforced in Azure
312 VMs across 8 resource groups affected
6h ago
GCP project-level labels incomplete
No environment or owner label on 68% of projects
1d ago
OCI compartment structure misaligned
Business unit mapping incomplete for Q1 billing
2d ago
๐Ÿ’ป
Overprovisioned Compute
VM sizes too large with always-on dev/test environments. Low CPU/memory utilization below 20% represents the #1 FinOps savings lever โ€” typically 20โ€“40% waste.
Waste Estimate
$680K
โ–ฒ Annually
Avg CPU Utilization
14%
โ”€โ”€ Target: 60%+
Always-On Dev VMs
824
โ–ฒ Running 24/7
Rightsizing Savings
$218K
โ–ผ If implemented
RI Waste
$94K
โ–ฒ Underused RIs
CPU Utilization Distribution
All VMs across clouds
Waste by Cloud Provider
Monthly $
Top Rightsizing Candidates
Sorted by savings potential
Instance ID Cloud Current Size Recommended CPU Avg Monthly Savings Environment
i-0a4b8f1c2d3e AWS m5.4xlarge m5.xlarge 7% $1,240 Dev
vm-prod-db-042 Azure Standard_D16s_v3 Standard_D4s_v3 11% $980 Prod
instance-gcp-78 GCP n1-standard-16 n1-standard-4 18% $744 Test
oci-shape-001 OCI VM.Standard2.16 VM.Standard2.4 9% $620 Dev
๐ŸŒ
No Environment Governance
No separation of dev/test/prod environments, resources running nights and weekends, no lifecycle management โ€” creating security risk, cost leakage, and audit nightmares.
Dev VMs Running Nights
412
โ–ฒ 58% waste hours
Weekend Compute Cost
$48K
โ–ฒ /month avoidable
Environments Tracked
3/8
โ”€โ”€ Needs 8/8
Single-Account AWS
1
โ–ฒ All in one account
Compute Hours by Env Type (Weekly)
Cloud Account/Project Strategy
Cloud-Specific Environment Problems
โ˜๏ธ
AWS โ€” Poor Account Strategy
Single AWS account for all environments. No account-level blast radius containment. All workloads share billing, IAM, and service limits.
โ˜๏ธ
Azure โ€” Resource Group Misuse
Resource groups used as flat containers rather than environment scopes. No policy inheritance hierarchy. Cost reports span all environments indiscriminately.
โ˜๏ธ
GCP โ€” Everything in One Project
All services deployed into a single GCP project. No project-per-environment separation. IAM over-permissioned and budget quotas not enforced per stage.
โ˜๏ธ
OCI โ€” Flat Compartment Model
Compartment hierarchy doesn't mirror business structure. No child compartments for env isolation. Security and cost policies applied inconsistently.
๐Ÿ’ฐ
Lack of Budget Controls & Alerts
No budgets configured, alerts not tied to cost owners โ€” a reactive posture that leads to surprise invoices and CFO escalations.
Teams Without Budget
11/14
โ–ฒ 79% uncovered
Last Surprise Invoice
$124K
โ”€โ”€ 3 weeks ago
Alert Response Rate
12%
โ”€โ”€ Target: 90%
Forecast Accuracy
ยฑ31%
โ”€โ”€ Target: ยฑ10%
Actual vs Budget by Team
Budget Tool Adoption by Cloud
Recent Budget Breach Alerts
Platform team exceeded budget by 187%
AWS โ€” $48,200 actual vs $16,800 budget. No alert configured.
Today
Data Engineering approaching 90% threshold
GCP BigQuery spend: $31,400 of $35,000 budget
1h ago
Azure Dev subscription has no budget set
12 resource groups, $22,100 spent this month with no ceiling
3d ago
๐Ÿ“ฆ
No Reserved Capacity / Commitment Strategy
On-demand usage only with no Savings Plans, Reserved Instances, or Committed Use Discounts โ€” resulting in 10โ€“30% unnecessary cloud spend.
On-Demand Overspend
$310K
โ–ฒ Annually avoidable
RI Utilization
42%
โ”€โ”€ Target: 85%+
Savings Plan Coverage
18%
โ”€โ”€ Target: 70%
Potential Savings
28%
โ–ผ If fully optimized
On-Demand vs Reserved Usage
Commitment Strategy by Cloud
๐Ÿ‘ค
Shadow IT & Uncontrolled Resource Creation
Engineers spinning up resources freely without IAM guardrails or approval workflows โ€” creating hundreds of orphaned disks, unattached public IPs, and snapshots never deleted.
Orphaned Resources
3,412
โ–ฒ Unowned
Unattached Disks Cost
$28K
โ–ฒ /month wasted
Idle Public IPs
847
โ–ฒ $0.005/hr each
Undeleted Snapshots
12,441
โ–ฒ 4.2TB of storage
Orphaned Resource Types
Shadow IT Remediation Timeline
IAM audit completed
Jan 2026 ยท Found 2,400 over-permissioned roles
Orphaned resource scan deployed
Feb 2026 ยท Identified 3,412 unowned resources
Approval workflow rollout
Mar 2026 ยท In progress โ€” 40% teams onboarded
Auto-cleanup policies
Q2 2026 ยท Scheduled โ€” Terraform + Lambda
Full governance model deployed
Q3 2026 ยท All clouds covered
๐Ÿข
No FinOps Operating Model
Organizational โ€” not technical. No cost ownership per team, no showback/chargeback, no unit economics KPIs, and no monthly cloud review process.
Teams with Cost Owner
2/14
โ–ฒ 86% no ownership
Showback Coverage
0%
โ”€โ”€ Not implemented
Monthly Reviews Held
0
โ”€โ”€ Last 6 months
Unit Cost Tracked
0/8
โ”€โ”€ No KPIs defined
Missing Capabilities
Cloud Financial Accountability
No engineer owns cost line items
Engineering-Finance Collaboration
No shared dashboards or reviews
Executive Visibility
No C-suite cloud cost dashboard
FinOps Maturity Model
Recommended KPIs
KPICurrentTarget
Cost per API callUnknown$0.0012
Cost per user/moUnknown$4.20
Unit cost trendNot tracked-5%/qtr
RI coverage18%70%
Tag compliance47%95%
โ˜๏ธ
Multi-Cloud Complexity
Different discount models, billing exports, no normalized cost schema, and inconsistent tagging taxonomies make cross-cloud optimization nearly impossible.
Billing Schemas
4
โ–ฒ All incompatible
Tagging Taxonomies
4
โ–ฒ Not normalized
Unified Dashboard
None
โ”€โ”€ Not yet built
Anomalies Detected
47
โ–ฒ This month
Total Spend by Cloud (Monthly)
Billing Export Complexity
CloudExport FormatNormalizedStatus
AWS CUR (massive CSV) No Partial
GCP BigQuery export No Not started
Azure Cost Management API No Not started
OCI Usage API No Not started
๐Ÿ“ˆ
Poor Forecasting & Budgeting
No predictive modeling, no seasonality analysis, no cost anomaly detection โ€” leaving teams blindsided by 30%+ cost spikes with no proactive action.
Forecast Error Rate
ยฑ31%
โ–ฒ Last quarter
Undetected Anomalies
23
โ–ฒ This month
Avg Cost Spike
+28%
โ–ฒ When they occur
Seasonal Patterns
0
โ”€โ”€ Not modeled
Actual vs Forecast Cost (12 Months)
Prophet-style time-series
๐Ÿค–
Time-Series Forecasting
Prophet-based models per service, per cloud. Seasonality detection. Trend projection with confidence intervals.
๐Ÿ“Š
Unit Cost Tracking
Cost per user, per API call, per transaction. Tracked over time. Alerts when unit cost drifts from baseline.
๐Ÿšจ
Anomaly Detection
ML-driven spike detection. Alert within hours not weeks. Root cause attribution per service tag.
๐Ÿค–
No Governance Automation (Policy as Code)
Manual governance with no Terraform guardrails, no auto-shutdown policies, and no tagging enforcement at deployment time โ€” all governance is manual and reactive.
Manual Governance Tasks
340
โ–ฒ /month performed
Policies Automated
4%
โ”€โ”€ Target: 80%+
Time Spent on Governance
120h
โ–ฒ /month engineering
Auto-Shutdown Policies
0
โ”€โ”€ None deployed
Automation Implementation Roadmap
Terraform modules audited
Jan 2026 ยท 48 modules reviewed, 0 guardrails found
Tag enforcement via OPA/Sentinel
Mar 2026 ยท In progress โ€” AWS + Azure piloting
Auto-shutdown Lambda policies
Q2 2026 โ€” Dev envs shut down nights/weekends
Cloud Service Control Policies (SCPs)
Q2 2026 โ€” AWS Organizations SCPs, Azure Policy
Full Policy-as-Code pipeline
Q3 2026 โ€” All clouds, CI/CD integrated
Governance Automation Coverage