AWS Data Access Policy

Our Information Security approach revolves around minimizing and protecting the data we need access to:

  • We use a least-privilege approach to gain access to cloud cost & usage, billing metadata on a non-intrusive basis.  
  • We operate in a way that makes it easy to isolate and audit what we’re doing.
  • We do not need access to the data within your cloud accounts/projects, or the ability to affect technical operation or configuration of your cloud services.

We combine policies, procedures and technical controls to ensure a consistently robust approach is maintained through our people and technology. We adhere to industry recognized standards such as ISO 27001 and ISO 9001. Security obligations are reflected in our contractual agreements with customers, cloud vendors, suppliers and partners. 

Data Access

We will only ever request access to, and store, the minimum information we need. This varies by cloud provider and for:

  • Potential customers using our Savings Review to evaluate our service.
  • Customers using our rate optimization services to reduce their cloud spend.
  • Customers who also use us as their cloud reseller.
data access

Data Approach

Data Security approach
Data required when evaluating our service
Data required as a rate optimization customer
Data required when we are your cloud reseller

Data Access FAQS

Do you have access to my systems and data once consolidated?
Do you have access to the IP address information of my servers?
How do you control who has access to my data?
Can you give examples of how you adhere to privacy legislation. i.e. GDPR?
Can you create an account on my behalf?
How do you confirm non-recoverable deletion of data?