
But the enterprise does not pay for isolated decisions. It pays for the aggregate. Cloud cost compounds because it is recurring. Idle capacity persists. Over-redundancy stacks. Shared services grow without allocation. And underneath all of it is a simple truth: Azure is a permissioned system. If something exists, some identity was allowed to create it. This should sound familiar to security professionals. Security drift happens when exceptions accumulate. Cost follows the same physics. When the platform allows creation without ownership metadata, budget boundaries, or constrained SKUs, drift is not a possibility. It is guaranteed. The typical response is predictable—and ineffective:
Awareness does not constrain behavior. Humans are not a control plane. The control plane is Azure Resource Manager, RBAC, Policy, and subscription boundaries. If those layers do not encode financial intent, the enterprise is running a distributed spending engine with no enforcement mechanism. By the time finance sees the invoice, the spend is no longer a choice.
It is debt. That is cost entropy: the conversion of deliberate spending into unmanaged recurrence. FinOps Implemented Backwards: Tooling First, Governance Never Most enterprises “do FinOps” the same way they do security awareness:
buy tools, build dashboards, hold reviews—and expect behavior to change. The pattern is always the same:
Everyone feels busy. Nothing is constrained. Observability is not governance.
Dashboards describe what happened. They do not decide what can happen next. This is why FinOps devolves into cost theater. Alerts become noise because they are not attached to an owner with authority or consequence. Engineers learn the real policy quickly: nothing happens when you exceed intent. Cost tooling tells you where the money went.
It cannot prevent the next dollar. The failure hides most clearly in shared services:
networking, logging, monitoring, security tooling, private endpoints. Everything “platform” deploys for safety and consistency—and everything nobody feels personally responsible for. Shared spend becomes invisible spend. Finance asks why cloud is expensive.
The platform team shows a dashboard.
Nothing changes. Because the question was wrong. The right question is:
Where is the enterprise allowing spend to occur without explicit intent, and how does the platform enforce that intent every time? The Reframe: Every Cloud Dollar Is an Authorization Decision A cloud bill is not a finance event.
It is the runtime side-effect of authorization. Before a dollar appears on an invoice:
Azure did not get expensive.
Azure did what it was allowed to do. This reframes everything. Cost does not start in Cost Management.
It starts at deploy time. If a resource exists, some permission path allowed it. If spend is anonymous, that is not a reporting failure—it is an authorization failure. And every exception converts your system from deterministic to probabilistic:
sometimes denied, sometimes allowed, depending on who asked, where, and which forgotten exemption still exists. Financial intent, architecturally, is not a spreadsheet.
It is enforced constraints:
Cost control lives with identity, policy, hierarchy, and exception governance. Savings are a byproduct.
Control is the goal. Subscriptions: The Primary Cost Governance Boundary Subscriptions are not just billing buckets.
They are where RBAC, Policy, and budgets intersect. Resource groups organize.
Management groups standardize.
Subscriptions contain damage. A real subscription strategy treats subscriptions as:
Sprawl happens when subscriptions are created without declared purpose. Each ad-hoc subscription is a new, unreviewed spending pathway. A subscription should not exist unless four things are true:
Subscription creation is a governance event, not a convenience. Tagging Fails Because It Is Treated as Etiquette Tagging is not manners.
Tagging is financial identity. If allocation depends on tags, then the platform must refuse untagged deployments. Otherwise, untagged resources become financial fossils: expensive, untouchable, and politically protected by ambiguity. Recommended tagging produces unusable data:
The rule is simple:
If a tag matters, it must be enforced. Use Policy:
Keep the taxonomy small. Normalize values. Treat tags as required metadata, not optional hints. When the platform refuses ambiguity, allocation becomes boring.
Boring is good. PaaS Over-Provisioning: Safety Externalized to the Bill Once ownership is real, teams hide behind “safety.” Premium tiers “just in case.”
Multi-zone everywhere.
Multi-region “for the future.” Each choice is defensible. Together they are financial entropy. Engineers are rewarded for uptime, not efficiency. So the platform must distinguish environments by intent:
Allowed SKUs by environment is not micromanagement.
It is cost engineering. Exceptions are allowed—but they must expire.
An exception without expi
Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365–6704921/support.