Govern what tags exist and who can apply them
1 controls use Tag Policies for implementation.
See how Tag Policies compares to other access control approaches with our detailed comparison table.