Flexera provides a wide variety of policies that you can apply on Day 1 without much investment. All our policies are open source and can be found in our public git repo.
Increase cost visibility and management in your multi-cloud world and take appropriate actions to run an efficient infrastructure.
|Add Expiring Cooldown Tags for Downsizing Instances||1.3||A policy that checks cooldown time tag that the downsize policy sets and if time has expired, it will add back the tag to allow the instance to be downsized|
|Azure Hybrid Use Benefit for Windows Server||1.0||Identifies eligible instances not utilizing Azure Hybrid Use Benefit|
|Azure Reserved Instances Utilization||1.0||A policy that sends email notifications when utilization falls below a threshold|
|Azure Superseded Instance Types||1.0||Discover disallowed instance types and resize to an approved instance type|
|Billing Center Cost Anomalies||1.0||Analyze all Billing Centers for a specified number of days and raise an incident if the percentage of spend (compared to the previous period of the same number of days) has surpassed the defined threshold|
|Budget Alerts||1.2||Create a Monthly Budget Alert for a Billing Center or for the entire Organization|
|Discover Old Snapshots||1.5||A policy that sends email notifications when snapshots older then a certain timeframe are found|
|Downsize Instances based on CPU and Memory||1.11||A policy that downsizes instances based on monitoring metrics|
|Expired Reserved Instances||1.5||A policy that sends email notifications before reserved instances expire|
|Google Committed Use Discount (CUD) Report||1.0||Report on all Google CUDs that have been purchased|
|Reserved Instance Report by Billing Center||1.1||This policy generates a Reserved Instances report by Billing Center|
|Reserved Instances Coverage||1.2||A policy that sends email notifications on reserved instance coverage|
|Reserved Instances Utilization||1.7||A policy that sends email notifications when utilization falls below a threshold|
|Schedule Instances||1.4||A policy that start and stops instances based on a schedule|
|Scheduled Report||1.5||This policy allows you to set up scheduled reports that will provide summaries of cloud cost across all resources in the billing centers you specify, delivered to any email addresses you specify|
|Unattached IP Addresses||1.0||Checks for Unattached IP Addresses and deletes them with approval|
|Unattached Volumes||1.7||Finds unattached volumes older than specified number of days and, optionally, deletes them|
Gain visibility and control across all your public and/or private cloud environments with our security policies. Improve security across your applications, data, and associated infrastructure by finding security vulnerabilities before your customers do.
|AWS Open Buckets||1.7||Checks for buckets that are open to everyone|
|Google Open Buckets||1.3||Checks for buckets that are open to the public|
|Security Group Rules with ports open to the world||1.0||A policy that sends email notifications when a security group has ports open to the world|
|Security Group Rules without Descriptions||1.7||A policy that sends email notifications when a security group has no description|
|Security Group with High Open Ports||1.4||A policy that sends email notifications when a security group has unapproved open ports|
|Security Groups with ICMP Enabled||1.5||A policy that sends email notifications a security group has icmp enabled|
Save valuable human time and investment by automating everyday IT operations. Running an automated and efficient cloud infrastructure frees up expensive resources on high ROI projects like scaling, growth, and deliver value faster than anyone else.
|AWS Cloud Credentials Rotation||1.5||Updates the IAM user keys used to connect RightScale to an AWS account|
|AWS RDS Backup Settings||1.1||Checks for RDS Instances that have unapproved backup settings|
|No Recent Snapshots||1.3||Policy to check for snaphots between now and a certain numer of days|
|Policy Template Synchronization||1.7||A policy to manage policy template|
Enterprises typically have multiple compliance requirements but struggle to automate them which leads to downtime as well as resource waste. By having a strong compliance strategy but also ability to quickly automate it provides peace of mind and avoids business interruption.
|Azure Disallowed Regions||1.0||A policy that discovers all Azure resources that have been provisioned in unapproved regions and optionally deletes them|
|Azure: Tag Resources with Resource Group Name||1.0||Scan all resources in an Azure Subscription, raise an incident if any resources are not tagged with the name of their Resource Group, and remediate by tagging the resource|
|Billing Center Access Report||1.1||This policy generates an access report by Billing Center|
|GitHub.com Available Seats Report||1.2||Gets the number of available seats for a licensed GitHub Org and creates an incident if they are out of the policy range|
|Untagged Resources||1.9||Check resources for missing tags and report on them|