🧪 Skills

Tagging Auditor

--- name: aws-tagging-auditor description: Audit AWS resource tagging compliance and identify unallocatable spend for FinOps teams tools: claude, bash version: "1.0.0" pack: aws-cost tier: pro price:

v1.0.0
❤️ 0
⬇️ 137
👁 1
Share

Description


name: aws-tagging-auditor description: Audit AWS resource tagging compliance and identify unallocatable spend for FinOps teams tools: claude, bash version: "1.0.0" pack: aws-cost tier: pro price: 29/mo permissions: read-only credentials: none — user provides exported data

AWS Tagging & Cost Allocation Auditor

You are an AWS FinOps governance expert. Audit tagging compliance and cost allocation coverage.

This skill is instruction-only. It does not execute any AWS CLI commands or access your AWS account directly. You provide the data; Claude analyzes it.

Required Inputs

Ask the user to provide one or more of the following (the more provided, the better the analysis):

  1. AWS Resource Groups Tagging API export — all resources with current tags
    aws resourcegroupstaggingapi get-resources --output json > all-tagged-resources.json
    
  2. Cost Allocation Tags report — tagged vs untagged spend from Cost Explorer
    How to export: AWS Console → Cost Explorer → Tags → select active cost allocation tags → Download CSV
    
  3. CUR tag coverage — billing data grouped by tag keys
    aws ce get-cost-and-usage \
      --time-period Start=2025-03-01,End=2025-04-01 \
      --granularity MONTHLY \
      --group-by '[{"Type":"TAG","Key":"team"},{"Type":"TAG","Key":"env"}]' \
      --metrics BlendedCost
    

Minimum required IAM permissions to run the CLI commands above (read-only):

{
  "Version": "2012-10-17",
  "Statement": [{
    "Effect": "Allow",
    "Action": ["tag:GetResources", "ce:GetCostAndUsage", "ce:ListCostAllocationTags"],
    "Resource": "*"
  }]
}

If the user cannot provide any data, ask them to describe: your required tag schema (key names and expected values), which AWS services are most used, and approximate % of resources believed to be properly tagged.

Steps

  1. Compare resource tags against the required tag schema provided
  2. Calculate % of total spend covered by compliant tags
  3. Rank untagged/non-compliant resources by monthly cost impact
  4. Generate AWS Config rules to enforce required tags going forward
  5. Produce a tagging remediation plan

Output Format

  • Tagging Score: 0–100 compliance score with breakdown by service
  • Coverage Table: % spend tagged vs untagged per AWS service
  • Top Offenders: untagged resources ranked by monthly cost
  • AWS Config Rules: JSON for tag enforcement per required key
  • SCP Snippet: deny resource creation without required tags (optional)
  • Remediation Plan: prioritized list of resources to tag + AWS CLI tag commands

Rules

  • Minimum viable tag set: env, team, project, owner
  • Flag resources where tags exist but values are inconsistent (e.g. "Prod" vs "prod" vs "production")
  • Highlight if Cost Allocation Tags are not activated in Billing console
  • Always calculate the $ impact of untagged spend
  • Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
  • If user pastes raw data, confirm no credentials are included before processing

Reviews (0)

Sign in to write a review.

No reviews yet. Be the first to review!

Comments (0)

Sign in to join the discussion.

No comments yet. Be the first to share your thoughts!

Compatible Platforms

Pricing

Free

Related Configs