How unusd.cloud manage the security?

How unusd.cloud manage the security?

The security measures employed by unusd.cloud and our data handling practices are detailed in this page.

🧙 Hub and Spoke model

Our AWS IAM Role on each of your AWS accounts utilizes the Hub and Spoke model in order to track your unutilized resources and spending information through a few read-only AWS API calls.

The ExternalId employed by the AWS IAM Role is unique to each customer, effectively eliminating the confused deputy problem.

hub-spoke model

👀 Read-only Permissions

The unusd.cloud AWS IAM Role is limited to read-only actions which are listed below:

Updated on 2023-03-26

💾 Data storage

We do not persist any confidential AWS information or information related to your AWS account. Only unusd.cloud meta data configuration items are stored:

  1. AWS AccountIDs
  2. Email configuration settings
  3. Webhooks (Slack / Microsoft Teams) URLs
  4. Prefered scan schedule

🔒 Encryption

TLS encryption is employed both at-rest and in-transit.

Recent Articles

blog-image
AWS Horror stories

The scariest thing to me about AWS is that I might accidentally bankrupt myself while I learn to use it.

blog-image
How unusd.cloud manage the security?

The security measures employed by unusd.cloud and our data handling practices are detailed in this page.

blog-image
What are the expected savings?

Let’s take some concrete examples of what unusd.cloud could save on your AWS bills.