Security and Compliance

This article will help you understand Usage's required access, security, and compliance standards.

Security and Compliance

At Usage, security and compliance are foundational to everything we do. We are committed to ensuring that your data remains secure, private, and fully under your control while we help you optimize your cloud costs.

1. Minimal Access, Maximum Security

Usage operates with a strict, minimal-access model, focusing solely on the data required to deliver cost optimization insights.

  • Billing Layer Access Only:
    We only access the billing layer and specific metadata related to the instances we’re covering. This includes:
    • Instance Type
    • Start/Stop Time
    • Existing Commitments
    • Region
    • CPU Utilization
  • No Access to Core Infrastructure:
    Usage cannot see, touch, start, or stop any of your resources beyond managing cloud commitments (like Reserved Instances or Savings Plans). Your infrastructure remains completely under your control.

2. Read-Only Permissions for Savings Tests

For customers evaluating Usage, we offer a read-only permissions option:

  • How It Works:
    During the integration process, simply toggle the “Read-Only” option.
  • Purpose:
    This allows Usage to perform a comprehensive savings test, identifying potential cost reductions without the ability to purchase any Reserved Instances or Savings Plans.
  • Benefits:
    • Provides full visibility into potential savings
    • Ensures zero impact on your environment during the evaluation phase
    • Gives peace of mind while you assess Usage’s value

3. Compliance and Best Practices

Usage follows industry best practices for data security and cloud compliance:

  • Principle of Least Privilege: We request only the permissions necessary to perform cost optimization.
  • Data Encryption: All data is encrypted in transit and at rest.
  • Secure API Integrations: We use secure APIs for communication with cloud providers, ensuring data integrity and confidentiality.

Why This Matters

Our goal is to deliver significant cloud savings without compromising the security or integrity of your environment. With Usage, you get:

  • Transparent access controls
  • Secure handling of billing data
  • Confidence in compliance with cloud security best practices

Your data. Your environment. Optimized safely.