Your Security is Our Top Priority
We take the responsibility of handling your AWS credentials very seriously. Here’s how we guarantee the security of your information.
1. Secure Handling of Your Credentials:
- Encrypted Storage: The AWS Access Key and Secret Key you provide are securely encrypted as soon as they are received.
- One-Time Use Only: These credentials are only used for a one-time scan of your AWS infrastructure to identify optimization opportunities.
- Immediate Deletion: After the scan is complete, your AWS credentials are automatically and permanently deleted from our system. We do not store these keys under any circumstances.
2. We Do Not Access Your Data:
- Infrastructure Only: Cloud-Trim only scans your AWS infrastructure to detect unused or underutilized resources such as instances, volumes, and services. We do not access or interact with any of your actual data, databases, or files stored within your AWS cloud.
- Read-Only Access: The IAM user you create has ReadOnlyAccess with LIMITED permissions, which means that Cloud-Trim cannot make any changes to your AWS environment.
3. Transparent Process:
- You can monitor what we access through the AWS CloudTrail service, which tracks and logs all AWS API calls, ensuring transparency.
4. Trusted Technology:
- Cloud-Trim is built on trusted cloud security standards, adhering to best practices in cloud infrastructure management and data security.