Help
Back to home
Português
Português
  • Visão geral
    • Nossas Features
    • Catálogo de descontos AWS
    • Money back guarantee
  • Como Começar
    • Etapas
      • Step 1 - Estimate Savings Preview
      • Step 2 - Authorize Dotted
      • Step 3 - Know your Business
      • Team Invitation
      • Additional AWS accounts
      • Post onboarding
    • Múltiplas contas
      • via 'Join Account(s)'
      • Leave an AWS Organization
      • via 'Join With A Pre-Existing Org(s)'
  • Plataforma e Serviços
    • Nossa plataforma
      • Menu de Navegação
      • Relatórios
        • Estimativas
        • Resultados
        • Cobranças
      • Configurações
        • Organizações
        • Contas
        • Usuários
      • Suporte
        • ChatDot AI
        • Suporte
    • Financeiro
    • Notas de Versão
  • Ajuda e Suporte
    • Dúvidas Gerais
    • Canais de Suporte
    • Acessos e Segurança
      • Cross Account Role
      • Role Deployment
      • Other Housekeeping
      • Access Management
  • Entendendo a AWS
    • Compromissos
    • Reservas de Instâncias (RIs)
    • Savings Plans
Fornecido por GitBook
Nesta página

Isto foi útil?

  1. Ajuda e Suporte
  2. Acessos e Segurança

Access Management

AnteriorOther HousekeepingPróximoCompromissos

Isto foi útil?

Restricted Access

Dotted adheres to AWS security best practices rigorously. We restrict the cross-account role for use only by Dotted's management account with the correct external ID.

Read-only permissions

We also limit permissions so that Dotted can only access your billing data and infrastructure metadata, which does not include any application data or user data. An example of the information we extract from your infrastructure metadata is as follows:

Six t2.micro on-demand instance types have been running continuously for the past 8 months, with consistent network traffic and an average CPU utilization of over 60%. Based on the last 4 months of AWS marketplace RI listing data, we can determine that t2.micro liquidity is high (it will take little time to sell this instance back to the marketplace). We recommend starting a 3-year, no-upfront RI order for 6 t2.micro instances and using algorithms to find the best deals for all 6 instances in the marketplace.

Beyond that, Dotted can only buy or sell reserved instances.

App authentication and authorization

Dotted uses Auth0 as our authentication platform, which is compliant with nearly all security certifications, such as GDPR, HIPAA, ISO27018, SOC II, ISO27001, etc. You can read here.

Security auditing

Dotted engages third-party companies to conduct regular penetration testing to identify any potential security risks. Additionally, we are in the process of obtaining SOC II certification.

more