Skip to content

Commit 7a53a5f

Browse files
authored
aws-organizations tag policies (#16621)
* aws-organizations tag policies * more adjustments * remove semicolon for clarity * adjust date * update links
1 parent 73da833 commit 7a53a5f

File tree

5 files changed

+603
-0
lines changed

5 files changed

+603
-0
lines changed
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: "Enforce AWS Organizations Tag Policies with Pulumi"
3+
date: 2025-11-20T10:00:00-08:00
4+
authors:
5+
- alejandro-cotroneo
6+
meta_desc: "Pulumi partners with AWS to bring AWS Organizations Tag Policies validation to infrastructure as code, enforcing mandatory tagging requirements."
7+
allow_long_title: true
8+
meta_image: "meta.png"
9+
tags:
10+
- aws
11+
- pulumi-service
12+
- policy-as-code
13+
- crossguard
14+
- features
15+
- governance
16+
- compliance
17+
---
18+
19+
Tags are the foundation of cloud governance, enabling cost allocation, ownership tracking, compliance reporting, and automation across your AWS infrastructure. Yet missing or inconsistent tags remain one of the most common governance challenges. Manual tag enforcement is error-prone, and discovering missing tags after deployment means your cost reports and compliance audits are already operating with incomplete data.
20+
21+
Today, we're excited to announce a new pre-built policy pack created in partnership with AWS: **AWS Organizations Tag Policies**. This pack validates your infrastructure as code against tag policies configured in AWS Organizations, blocking deployments when required tags are missing and shifting tag governance left into your development workflow. Define your tag requirements once in AWS Organizations and enforce them consistently across all your Pulumi deployments.
22+
23+
<!--more-->
24+
25+
## How it works
26+
27+
The new policy pack integrates directly with your AWS Organizations Tag Policies as the single source of truth. No separate policy configuration or custom code required. When you run `pulumi up`, the pack retrieves your tag requirements from your AWS organization and validates that every resource has the required tags.
28+
29+
Start by enabling the pack in advisory mode to surface tagging violations in Pulumi Cloud's [Policy Findings](/docs/insights/policy/policy-findings/) hub without blocking deployments. This collaborative workspace allows your team to triage, prioritize, and systematically remediate missing tags. Once your infrastructure is compliant, switch to mandatory mode to prevent future non-compliant deployments.
30+
31+
## Getting started
32+
33+
The pack works with both AWS Classic and AWS Native Pulumi providers, covering the full range of taggable AWS resources. To get started:
34+
35+
1. **Configure tag policies** in AWS Organizations following the [AWS documentation](https://docs.aws.amazon.com/organizations/latest/userguide/enforce-required-tag-keys-iac.html).
36+
1. **Grant required permissions** by adding the `resourcegroupstaggingapi:ListRequiredTags` permission to the IAM role or user that runs your Pulumi deployments.
37+
1. **Enable the pack in Pulumi Cloud**:
38+
1. From within your organization, navigate to the **Policies** tab
39+
1. Under Policy Packs, select the **Available** tab
40+
1. Select **AWS Organizations Tag Policies** and select **Add to organization**
41+
1. From the Organizations tab, apply the policy to a Policy Group
42+
1. **Configure enforcement level**: Set to advisory for warnings or mandatory to block non-compliant deployments.
43+
44+
Within minutes, every Pulumi deployment in your organization will validate tag compliance, ensuring that no resources are created without required tags.
45+
46+
## Try it today
47+
48+
The AWS Organizations Tag Policies policy pack is now available to all Pulumi Team and Enterprise customers.
49+
50+
- [Get started with the integration](/docs/insights/policy/integrations/aws-organizations-tag-policies/)
51+
- [Learn about enforcing tag policies with AWS Organizations Tag Policies](https://docs.aws.amazon.com/organizations/latest/userguide/enforce-required-tag-keys-iac.html)
52+
- [Sign up for Pulumi Cloud](https://app.pulumi.com/signup) if you're new to Pulumi
53+
- [Join the Community Slack](https://slack.pulumi.com/) to share feedback
54+
55+
We're excited to partner with AWS on this capability and help organizations proactively enforce tag governance. Give it a try and let us know what you think!
872 KB
Loading

0 commit comments

Comments
 (0)