Security & Privacy
We never store your AWS data or credentials. All processing occurs in-memory, and results are stored exclusively in your AWS account with industry-leading security.
Security Architecture
Ephemeral Credentials
Short-lived credentials exist only in memory and are automatically destroyed after expiration or session closure.
- 1-hour max lifetime & Encrypted in-memory storage
- Automatic destruction on session end
- Never persisted to databases
Read-Only by Default
All tools operate with read-only permissions unless write access is explicitly required.
- Minimal required permissions
- Principle of least privilege
- Clear permission documentation
MFA for Write Operations
Any operation that modifies your AWS resources requires multi-factor authentication.
- TOTP-based authentication
- Backup codes available
- Session-based MFA verification
Cross-Account Role Assumption
Secure access to your AWS account through IAM roles, not access keys.
- External ID validation
- Role-based access control
- No direct credential sharing
Your Data Never Leaves Your Control
Zero Data Retention
We never store your AWS data. All processing occurs in-memory and results are stored exclusively in your AWS account.
- No persistent data storage on our servers
- In-memory processing only
- Automatic data purging after processing
- All reports stored in your S3/DynamoDB
Ephemeral Credentials
Temporary credentials are encrypted in-memory and automatically destroyed after use or session expiration.
- TLS 1.3 encrypted in transit
- AES-256 encrypted in memory
- Automatic destruction after 1 hour
- Never persisted to disk
Client-Side Storage
All generated reports and configurations are stored in your AWS account, never in our infrastructure.
- Reports saved to your S3 buckets
- Configurations stored in your DynamoDB
- Metadata pointers only in our systems
- You maintain full data ownership
Compliance & Certifications
SOC 2 Type II
Audited security controls for service organizations
ISO 27001
International standard for information security management
GDPR
European data protection and privacy regulation
CCPA
California Consumer Privacy Act compliance
Security Best Practices
Our commitment to maintaining the highest security standards
Data & Credential Security
- Ephemeral in-memory credentials with auto-destruction
- Zero persistent storage of sensitive data
- Client-owned storage for all reports and configurations
- End-to-end encryption for data in transit/at rest
- Automatic purging of processed data
Infrastructure & Application Security
- AWS-hosted with network segmentation
- DDoS protection and regular security assessments
- Secure coding practices with dependency scanning
- Automated security monitoring and alerts
- Process isolation and least privilege access
Incident Response
How we handle security incidents and keep you informed
Detection
24/7 monitoring and automated alerting systems
Response
Immediate containment and mitigation procedures
Communication
Transparent communication with affected users
Security Questions?
Our security team is here to answer any questions about our security practices, compliance, or how we protect your data.