Validate and enforce required tags in CloudFormation, Terraform and Pulumi with Tag Policies

Published
November 20, 2025
https://aws.amazon.com/about-aws/whats-new/2025/11/validate-enforce-required-tags-cloudformation-terraform-pulumi/

AWS Organizations Tag Policies

AWS Organizations Tag Policies introduces Reporting for Required Tags, a new validation check that ensures CloudFormation, Terraform, and Pulumi deployments include required tags critical to your business. This feature enforces tagging consistency across AWS environments.

What to do

  • Define your tag policy
  • Enable validation in each IaC tool

Tag Policies enforce consistent tagging across AWS accounts with proactive compliance, governance, and control. You can specify mandatory tag keys and enforce guardrails for IaC deployments. For example, ensure all EC2 instances have “Environment”, “Owner”, and “Application” tags.

Activate validation by using the AWS::TagPolicies::TaggingComplianceValidator Hook in CloudFormation, adding validation logic in your Terraform plan, or activating the aws-organizations-tag-policies pre-built policy pack in Pulumi. This ensures resources like EC2 instances include the required tags.

You can use this feature via AWS Management Console, AWS CLI, and AWS SDK. This feature is available in AWS Regions where Tag Policies is available.

Source: AWS release notes




If you need further guidance on AWS, our experts are available at AWS@westloop.io. You may also reach us by submitting the Contact Us form.

Follow our blog

Get the latest insights and advice on AWS services from our experts.

By clicking Sign Up you're confirming that you agree with our Terms and Conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.