Security and Compliance
At Usage, security and compliance are foundational to everything we do. We are committed to ensuring that your data remains secure, private, and fully under your control while we help you optimize your cloud costs.
1. Minimal Access, Maximum Security
Usage operates with a strict, minimal-access model, focusing solely on the data required to deliver cost optimization insights.
- Billing Layer Access Only:
We only access the billing layer and specific metadata related to the instances we’re covering. This includes:- Instance Type
- Start/Stop Time
- Existing Commitments
- Region
- CPU Utilization
- No Access to Core Infrastructure:
Usage cannot see, touch, start, or stop any of your resources beyond managing cloud commitments (like Reserved Instances or Savings Plans). Your infrastructure remains completely under your control.
2. Read-Only Permissions for Savings Tests
For customers evaluating Usage, we offer a read-only permissions option:
- How It Works:
During the integration process, simply toggle the “Read-Only” option. - Purpose:
This allows Usage to perform a comprehensive savings test, identifying potential cost reductions without the ability to purchase any Reserved Instances or Savings Plans. - Benefits:
- Provides full visibility into potential savings
- Ensures zero impact on your environment during the evaluation phase
- Gives peace of mind while you assess Usage’s value
3. Compliance and Best Practices
Usage follows industry best practices for data security and cloud compliance:
- Principle of Least Privilege: We request only the permissions necessary to perform cost optimization.
- Data Encryption: All data is encrypted in transit and at rest.
- Secure API Integrations: We use secure APIs for communication with cloud providers, ensuring data integrity and confidentiality.
Why This Matters
Our goal is to deliver significant cloud savings without compromising the security or integrity of your environment. With Usage, you get:
- Transparent access controls
- Secure handling of billing data
- Confidence in compliance with cloud security best practices
Your data. Your environment. Optimized safely.