ZERO WRITE PERMISSIONS
Read-only. Always.
Here's the proof.
CostPatrol connects via a CloudFormation-deployed IAM role with zero write permissions. We observe and report. We never modify your infrastructure. Below is every permission we request and why.
Three steps. Zero credentials stored.
You deploy a CloudFormation template
One-click deployment in your AWS account. Creates a read-only IAM role with an external ID unique to your account. No agents, no long-term credentials.
Takes under 2 minutesCostPatrol assumes the role temporarily
1-hour STS session tokens. No stored credentials. External ID prevents confused deputy attacks.
MaxSessionDuration: 3600 secondsWe scan and report. That's it.
Read-only API calls to describe and list resources. Results packaged as savings actions and delivered to Slack.
No state changes. Ever.Every permission we request
These are the exact IAM actions in our CloudFormation template. Nothing more. Nothing hidden.
What we CANNOT do
Our IAM policy contains only Describe, Get, and List actions. The following operations are impossible with our permissions.
- Create, modify, or delete any AWS resource
- Access S3 object contents or log data contents
- Modify IAM roles, policies, or permissions
- Access secrets, parameters, or credentials in your account
- Make any API call that changes state
Data protection
Every layer of our stack is designed with defense in depth. Here is how we protect the data we collect.
Encryption in transit
All traffic encrypted with TLS 1.2+ (TLS 1.3 preferred). No plaintext connections accepted.
Encryption at rest
Data at rest encrypted with AES-256. DynamoDB server-side encryption enabled on all tables.
Multi-tenant isolation
Composite DynamoDB keys ensure strict tenant isolation. No customer can access another customer's data.
Security headers
HSTS headers enforced. CORS restricted to costpatrol.io. Content Security Policy applied.
WAF protection
AWS WAF active with rate limiting, SQL injection, and XSS protection rules.
Short-lived credentials
1-hour STS session tokens only. No long-term AWS credentials stored anywhere in our infrastructure.
Standards and certifications
SOC 2 Type II
Working toward SOC 2 Type II certification covering security, availability, and confidentiality trust service criteria.
GDPR
Data processing agreement available on request. We process only infrastructure metadata, not personal data.
Data retention
Retention is configurable. All data deleted on account disconnection. No data held after offboarding.
Audit logging
All access and operations logged with 2-year retention in immutable storage for forensic analysis.
See exactly what we deploy. Then start your free scan.
Review the CloudFormation template yourself. Every permission is documented above. Read-only access, deployed in your account, under your control.