• Identify Roles - Protect sensitive data by defining which roles can access a resource.
  • Related Resources - To make bulk processing and updating easier, define which resources are related.
  • Filter - Filter resources per project, customer, or for reporting purposes.
  • Unambiguous - Create a list of used tags that includes description, tag name, and potential values.