The Three Phases of the FinOps Framework
The FinOps Foundation framework is iterative, not linear. Teams move through the phases at different speeds for different workloads. A mature organisation might be in the "Operate" phase for its core production environment but still in "Inform" for a newly acquired subsidiary's GCP project.
Phase 1: Inform
The goal here is accurate, granular visibility into cloud spend—broken down by team, service, environment, and ideally by feature or customer.
Foundational practices:
- Tagging and labelling. Every resource gets tagged with
team,environment,cost-center, andprojectat minimum. Enforce this through IaC pipelines: an untagged resource should fail CI. AWS Service Control Policies (SCPs), Azure Policy, and GCP Organization Policies can deny resource creation without required tags. - Cost allocation. Map cloud line items to business units. AWS Cost Categories and Azure cost allocation rules help, but shared resources (networking, shared Kubernetes clusters) require allocation logic—often split by namespace CPU/memory request ratios.
- Showback and chargeback. Showback displays costs to teams without billing them; chargeback actually bills internal teams. Most organisations start with showback. The political and accounting overhead of chargeback is real—don't skip showback.
Tooling for Inform:
| Capability | AWS | Azure | GCP | Multi-Cloud |
|---|---|---|---|---|
| Billing exports | CUR (Cost and Usage Reports) to S3 | Exports to Storage Account | BigQuery billing export | FOCUS format |
| Native cost tool | Cost Explorer | Cost Management + Billing | Cloud Billing Reports | — |
| Anomaly detection | Cost Anomaly Detection | Cost alerts + Advisor | Billing budgets & alerts | Datadog Cloud Cost, Kubecost |
| Tag enforcement | SCPs, Config Rules | Azure Policy | Org Policies | OPA/Rego in Terraform CI |
The FOCUS (FinOps Open Cost and Usage Specification) standard deserves special mention. It defines a vendor-neutral schema for cost and usage data, making multi-cloud cost analysis possible without building custom ETL for each provider. AWS, Azure, and GCP all support FOCUS-compatible exports as of 2025. If you run two or more clouds, adopt FOCUS early—it saves months of data-engineering work later.
Phase 2: Optimise
With visibility established, the Optimise phase targets concrete waste reduction and rate optimisation.
Rightsizing is the highest-impact lever for most organisations. Cloud providers consistently report that the majority of VM instances are over-provisioned. AWS Compute Optimizer, Azure Advisor, and GCP Recommender all generate rightsizing suggestions based on utilisation data. The catch: you need at least 14 days of CloudWatch/Azure Monitor/Cloud Monitoring metrics before recommendations are reliable. Opsio's practice is to collect 30 days before acting, because two-week samples miss monthly batch jobs.
Commitment-based discounts come in several flavours:
| Mechanism | AWS | Azure | GCP | Typical Savings vs On-Demand |
|---|---|---|---|---|
| 1-year commitment | Reserved Instances / Savings Plans | Reserved VM Instances / Savings Plans | Committed Use Discounts (CUDs) | 30–40% |
| 3-year commitment | Reserved Instances / Savings Plans | Reserved VM Instances / Savings Plans | CUDs | 50–60% |
| Spot/preemptible | Spot Instances | Spot VMs | Spot VMs (formerly Preemptible) | 60–90% (with interruption risk) |
Commitment purchases are not "set and forget." Opsio runs quarterly commitment reviews because workload profiles shift—a team migrating from EC2 to Fargate renders Compute Savings Plans more appropriate than EC2-scoped RIs. Unused reservations are pure waste.
Other optimisation levers:
- Scheduling non-production environments. Dev and staging environments rarely need to run 24/7. Instance Scheduler on AWS or Azure Automation Runbooks can shut down resources outside business hours, cutting non-prod compute cost roughly in half.
- Storage tiering. S3 Intelligent-Tiering, Azure Blob lifecycle policies, and GCP Autoclass move data to cheaper tiers automatically. For static archives, S3 Glacier Deep Archive or Azure Archive Storage costs a fraction of standard storage.
- Orphan resource cleanup. Unattached EBS volumes, stale snapshots, idle Elastic IPs, and abandoned load balancers accumulate silently. Opsio's NOC runs automated weekly sweeps for these across client accounts. Cloud FinOps
Phase 3: Operate
Operate is where FinOps becomes self-sustaining. Policies, automation, and cultural norms prevent cost regressions.
Governance patterns we recommend:
- Budget alerts with escalation. AWS Budgets, Azure Budget alerts, and GCP budget notifications should trigger at 80% and 100% of forecasted monthly spend—and page the team lead, not just send an email that gets buried.
- Anomaly detection with automated response. AWS Cost Anomaly Detection can send alerts to Slack or PagerDuty. For high-risk scenarios (runaway GPU spend), Opsio wires anomaly alerts into the NOC's incident management workflow so an engineer investigates within SLA.
- Architecture reviews with cost as a dimension. The AWS Well-Architected Framework includes a Cost Optimization pillar with specific design principles. Azure's Well-Architected Framework and GCP's Architecture Framework have equivalent guidance. Cost should be reviewed at design time, not after the first bill.
- Unit economics tracking. Mature FinOps teams measure cost-per-transaction, cost-per-customer, or cost-per-API-call—not just total spend. This connects cloud cost to business metrics and makes trade-off conversations concrete.
Multi-Cloud FinOps: The Hard Part
Running FinOps across AWS, Azure, and GCP simultaneously introduces challenges that single-cloud organisations don't face:
Billing model differences. AWS charges per-second for EC2 (Linux), Azure charges per-minute for VMs, and GCP applies sustained use discounts automatically. Comparing unit costs across clouds requires normalisation—which is exactly what FOCUS was designed for.
Organisational fragmentation. It's common for different business units to adopt different clouds. The FinOps team needs a single pane of glass that aggregates spend from AWS Organizations, Azure EA/MCA billing, and GCP Billing Accounts. Commercial platforms like Apptio Cloudability, Flexera One, or Spot by NetApp handle this; open-source alternatives include OpenCost (CNCF sandbox project) for Kubernetes-specific cost allocation.
Discount stacking complexity. A workload might qualify for an AWS Savings Plan, an Azure Hybrid Benefit (if Windows), and a GCP CUD. The FinOps team must model each independently and avoid double-counting projected savings.
Currency normalisation for Indian multi-cloud setups. AWS bills Indian customers in INR through its local entity, whereas Azure and GCP typically bill in USD (GCP offers INR invoicing for certain contract types). Multi-cloud FinOps dashboards must normalise to a single currency—usually INR for India-headquartered organisations—to avoid misleading comparisons. Exchange-rate fluctuations can materially affect month-on-month variance; automate currency conversion using daily RBI reference rates rather than static assumptions.
Opsio's approach for multi-cloud clients is to establish FOCUS-formatted exports into a shared data warehouse (typically BigQuery or Snowflake), then build unified dashboards in Grafana or Looker. This gives a single cost view regardless of provider, with drill-down capability to individual resources. Managed Cloud Services
FinOps for Indian Organisations: Compliance Constraints on Cost Optimisation
Cost optimisation in India isn't purely a financial exercise. Regulatory constraints shape what you can and cannot do—and these constraints are becoming more prescriptive year on year.
DPDPA 2023 and Data Residency
The Digital Personal Data Protection Act, 2023, permits cross-border data transfer to jurisdictions not restricted by the central government. However, the Act grants MeitY the authority to notify a negative list of countries at any point. FinOps teams should maintain flexibility in commitment purchases so that workloads can be moved back to domestic regions if data-localisation rules tighten.
The primary domestic cloud regions are:
- AWS: ap-south-1 (Mumbai) and ap-south-2 (Hyderabad)
- Azure: Central India (Pune) and South India (Chennai)
- GCP: asia-south1 (Mumbai) and asia-south2 (Delhi)
FinOps implication: When modelling commitment purchases, keep a meaningful portion of commitments scoped to Indian regions. AWS Savings Plans are region-flexible by default; if compliance requires India-only placement, use EC2 Instance Savings Plans scoped to specific instance families in ap-south-1 or ap-south-2.
RBI Circulars for BFSI Workloads
The Reserve Bank of India's guidelines on outsourcing of IT services and its framework on cloud adoption for Regulated Entities (REs) require BFSI organisations to ensure that critical data resides in India. The RBI mandates that regulated entities maintain the ability to access data within India, conduct audits, and ensure business continuity from Indian soil. This effectively means that core banking systems, payment processing workloads, and customer data stores should remain in Indian cloud regions.
FinOps implication: For BFSI organisations, shifting workloads to cheaper overseas regions (e.g., us-east-1 for lower Spot pricing) is not an option for regulated data. FinOps models must work within the price envelope of Indian regions. Opsio recommends isolating regulated workloads in dedicated accounts tagged with compliance:rbi-regulated so that FinOps automation does not inadvertently recommend cross-border moves.
SEBI Cloud Guidelines
SEBI's circular on cloud services for regulated entities (stock exchanges, depositories, clearing corporations, and market intermediaries) mandates data localisation within India for critical systems and stipulates specific security and audit requirements for cloud service providers. FinOps teams in capital markets firms must ensure that optimisation actions—such as moving to a different cloud provider or region for cost savings—do not breach SEBI's approval framework.
MeitY Guidelines and Government Workloads
For government and public-sector workloads, MeitY's GI Cloud (MeghRaj) initiative and its empanelment requirements for cloud service providers dictate which providers and regions are permissible. FinOps decisions for government projects must stay within the set of empanelled cloud providers and approved Indian regions.
FinOps implication across all regulated sectors: Build compliance guardrails directly into your FinOps automation. Use AWS SCPs, Azure Policy, and GCP Organization Policies to restrict resource creation to approved regions before optimisation recommendations are even generated. Cloud Security
Spot Instance Availability in Indian Regions
India regions (particularly ap-south-1 Mumbai) typically have less spare capacity than US or EU regions, which can mean higher Spot pricing and more frequent interruptions. Opsio's recommendation for India-based workloads: use Spot for stateless, fault-tolerant batch workloads (data processing, CI/CD runners, rendering); prefer Savings Plans for production compute. The newer ap-south-2 (Hyderabad) region often has better Spot availability due to lower overall demand—worth evaluating for workloads that can tolerate cross-region placement.
Building a FinOps Team: Roles and Org Design
FinOps doesn't require a massive team. It requires the right cross-functional representation.
Core roles:
- FinOps Lead / Practitioner. Owns the practice, runs cadences, maintains dashboards. Reports to CTO, CFO, or VP Engineering depending on org structure.
- Engineering liaisons. One per major product team. They translate cost data into architectural decisions.
- Finance partner. Handles forecasting, budgeting, chargeback accounting. In India, this role often coordinates with the GST and TDS compliance team, as cloud invoices carry tax implications.
- Executive sponsor. Without C-level backing, FinOps degrades to a reporting exercise that nobody acts on.
Cadences that work:
- Weekly: Automated cost reports emailed to team leads (showback).
- Monthly: FinOps review meeting—anomalies, optimisation actions taken, upcoming commitment decisions.
- Quarterly: Commitment portfolio review, forecast re-baseline, rate negotiation with cloud providers (for enterprise agreements).
For organisations that lack internal FinOps capacity, a managed approach can accelerate time to value. Opsio operates as an embedded FinOps function for clients, handling tagging audits, commitment modelling, anomaly investigation, and executive reporting while building internal capability over time. Managed DevOps
FinOps Maturity: Crawl, Walk, Run
The FinOps Foundation defines a maturity model with three stages. Here's what each looks like in practice:
| Capability | Crawl | Walk | Run |
|---|---|---|---|
| Cost visibility | Monthly PDF from finance | Tagged dashboards, weekly review | Real-time, per-team, per-feature |
| Optimisation | Ad-hoc rightsizing | Scheduled reviews, some automation | Autonomous rightsizing, ML-driven anomaly response |
| Commitments | No RIs/Savings Plans | Annual RI purchase, basic coverage | Rolling commitment portfolio, automated purchasing |
| Governance | No budget alerts | Budget alerts at account level | Policy-as-code, automated remediation |
| Unit economics | Not tracked | Cost-per-service measured | Cost-per-customer, margin analysis per product line |
Most organisations Opsio onboards are between Crawl and Walk. That's normal. The goal isn't to reach "Run" everywhere simultaneously—it's to advance the capabilities that matter most for your cost profile.
Common FinOps Mistakes
Starting with tooling instead of culture. A FinOps platform is useless if engineers don't look at cost data and aren't empowered to act on it. Start with showback reports and a monthly review meeting before evaluating six-figure (or crore-level) SaaS platforms.
Buying commitments too early. Reserved Instances purchased before workloads stabilise often go partially unused. Opsio's rule of thumb: don't purchase commitments until a workload has been stable in production for at least 60 days.
Ignoring data transfer costs. Cross-AZ and cross-region data transfer on AWS is a notoriously opaque cost driver. A service architecture with chattier-than-expected inter-service communication can generate data transfer bills that dwarf the compute cost. This is especially relevant in India where multi-AZ deployments within ap-south-1 (Mumbai) are standard for resilience—map data flows before optimising compute.
Treating Kubernetes as a cost black box. Without namespace-level cost allocation (via Kubecost, OpenCost, or cloud-native container cost tools), Kubernetes clusters become a shared cost pool that nobody owns. Allocate cluster costs by namespace, and make teams responsible for their resource requests.
Overlooking GST and withholding tax implications. In India, cloud invoices attract GST (currently 18% on cloud services). When comparing on-demand versus commitment pricing, factor in the tax impact. For cross-border cloud billing (Azure and GCP invoiced in USD), TDS obligations under Section 195 of the Income Tax Act may apply. Your finance partner should be involved in FinOps decisions to avoid tax surprises.
Getting Started: A 90-Day FinOps Roadmap
Days 1–30 (Inform):
1. Enable detailed billing exports (CUR, Azure exports, GCP BigQuery export) in FOCUS format.
2. Define and enforce a minimum tagging standard via IaC policy.
3. Build initial cost dashboards per team and environment.
Days 31–60 (Quick Wins):
4. Identify and terminate orphan resources (unattached volumes, idle IPs, stale snapshots).
5. Schedule non-production environments to shut down evenings and weekends (accounting for IST working hours).
6. Enable native anomaly detection on all accounts.
Days 61–90 (Optimise):
7. Run rightsizing analysis on compute (30+ days of metrics required).
8. Model Savings Plan or CUD coverage for stable production workloads—scoped to Indian regions for regulated data.
9. Establish a monthly FinOps review cadence with engineering and finance stakeholders.
This 90-day plan reliably surfaces meaningful savings while building the cultural foundation for sustained FinOps practice. Opsio runs a structured version of this as part of every Cloud FinOps engagement.
Frequently Asked Questions
What is FinOps for cloud?
FinOps for cloud is a cross-functional operating model that gives engineering, finance, and business stakeholders shared visibility into cloud spending and shared responsibility for optimising it. It combines cultural practices (showback, chargeback, cost-aware architecture) with tooling (native cloud billing APIs, third-party platforms) to align cloud investment with business value.
What is the difference between cloud FinOps and FinOps?
There is no practical difference. "FinOps" originated as shorthand for Cloud Financial Operations, so the terms are interchangeable. The FinOps Foundation's framework applies specifically to cloud and SaaS spend. Some practitioners extend FinOps thinking to data centres or software licensing, but the canonical definition centres on variable cloud consumption models.
What are the three pillars of FinOps?
The FinOps Foundation defines three iterative phases—Inform, Optimise, and Operate. Inform builds visibility through tagging, allocation, and reporting. Optimise acts on that data via rightsizing, commitment purchases, and waste elimination. Operate embeds governance, policies, and automation so savings persist. These phases run in a continuous loop, not a one-time sequence.
What tools do I need to start with FinOps?
Start with native cloud cost tools: AWS Cost Explorer and Cost Anomaly Detection, Azure Cost Management, or GCP Billing Reports. Layer on a multi-cloud platform like Kubecost or OpenCost for Kubernetes cost allocation, or commercial tools such as Apptio Cloudability or Flexera One if you run workloads across providers. Tag enforcement via IaC linting (OPA policies in Terraform pipelines) is equally critical and often overlooked.
How does FinOps relate to compliance in India?
Indian organisations operating under DPDPA 2023, RBI cloud circulars (for BFSI), and SEBI guidelines (for capital markets) must ensure that cost-optimisation moves—like shifting workloads to cheaper overseas regions or reducing logging retention—don't violate data-residency or security requirements. FinOps governance should include compliance guardrails so that commitment purchases, Spot Instance placements, and storage tiering decisions are restricted to approved Indian regions (ap-south-1 Mumbai, ap-south-2 Hyderabad, Central India, South India) and configurations. For government workloads, only MeitY-empanelled cloud providers and approved regions are permissible.
