Our Information Security approach revolves around minimizing and protecting the data we need access to:
- We use a least-privilege approach to gain access to cloud cost & usage, billing metadata on a non-intrusive basis.
- We operate in a way that makes it easy to isolate and audit what we’re doing.
- We do not need access to the data within your cloud accounts/projects, or the ability to affect technical operation or configuration of your cloud services.
We combine policies, procedures and technical controls to ensure a consistently robust approach is maintained through our people and technology. We adhere to industry recognized standards such as ISO 27001 and ISO 9001. Security obligations are reflected in our contractual agreements with customers, cloud vendors, suppliers and partners.