CloudCostGuard requires read-only access to cloud resources. It never creates, modifies, or deletes infrastructure.
AWS -- Minimum IAM permissions:
ec2:DescribeInstances,ec2:DescribeVolumeselasticloadbalancing:DescribeLoadBalancersrds:DescribeDBInstancess3:ListBuckets,s3:GetBucketMetricsConfigurationcloudwatch:GetMetricStatistics
Azure -- Minimum RBAC role:
Readeron the target subscription (built-in role)Monitoring Readerfor metrics access
- CloudCostGuard does not store credentials. It relies on the standard provider SDKs (
aws-sdk-go-v2,azure-sdk-for-go) which read credentials from environment variables, config files, or instance metadata. - Never pass credentials via CLI flags or config files checked into version control.
- Use short-lived credentials (IAM roles, Azure Managed Identity) whenever possible.
- Scan results may contain resource IDs and tags. Treat output files as sensitive.
If you discover a security issue, please email security@cloudcostguard.dev with:
- A description of the vulnerability
- Steps to reproduce
- Any relevant logs or screenshots
We will acknowledge receipt within 48 hours and aim to provide a fix or mitigation within 7 days. Please do not open a public issue for security vulnerabilities.