Help
Back to home
English
English
  • Overview
    • Our Features
    • AWS Discount Catalog
    • Money back guarantee
  • Getting Started
    • Step 1 - Estimate Savings Preview
    • Step 2 - Know your Business
    • Step 3 - Join Dotted
    • Team Invitation
    • Additional AWS accounts
    • Post onboarding
  • Multi-account architecture
    • via 'Join Account(s)'
    • Leave an AWS Organization
    • via 'Join With A Pre-Existing Org(s)'
  • Dotted Platform
    • Dashboard
    • Estimate View
    • Effective Savings Rate
    • Finops Teams Time Spent
    • Past Savings
    • Volume Tier Discounts
    • Invoices from AWS & Dotted
    • Payments
    • Sales or Value added tax (VAT)
  • Security & Access
    • Cross Account Role
    • IAM Role Breakdown
    • Role Deployment
    • Other Housekeeping
    • Access Management
  • General FAQ
  • Legal
    • Privacy Policy
    • Terms of Use
    • Mutual Non-Disclosure Agreement
  • Understanding AWS
    • Reserved Instances
    • Savings Plans
    • Commitments
      • What are commitments in AWS?
Fornecido por GitBook
Nesta página

Isto foi útil?

  1. Security & Access

Access Management

AnteriorOther HousekeepingPróximoGeneral FAQ

Isto foi útil?

Restricted Access

Dotted adheres to AWS security best practices rigorously. We restrict the cross-account role for use only by Dotted's management account with the correct external ID.

Read-only permissions

We also limit permissions so that Dotted can only access your billing data and infrastructure metadata, which does not include any application data or user data. An example of the information we extract from your infrastructure metadata is as follows:

Six t2.micro on-demand instance types have been running continuously for the past 8 months, with consistent network traffic and an average CPU utilization of over 60%. Based on the last 4 months of AWS marketplace RI listing data, we can determine that t2.micro liquidity is high (it will take little time to sell this instance back to the marketplace). We recommend starting a 3-year, no-upfront RI order for 6 t2.micro instances and using algorithms to find the best deals for all 6 instances in the marketplace.

Beyond that, Dotted can only buy or sell reserved instances.

App authentication and authorization

Dotted uses Auth0 as our authentication platform, which is compliant with nearly all security certifications, such as GDPR, HIPAA, ISO27018, SOC II, ISO27001, etc. You can read here.

Security auditing

Dotted engages third-party companies to conduct regular penetration testing to identify any potential security risks. Additionally, we are in the process of obtaining SOC II certification.

more