CloudSploit performs read-only API calls to the control-plane of the IaaS account. For example, in AWS, we make calls to list EC2 instances, S3 buckets, RDS instances, etc. CloudSploit never gets visibility into the contents of those resources, only the configuration metadata of how they are deployed. This access level allows us to generate security reports that highlight misconfigurations in your IaaS accounts.
How does Cloudsploit avoid reading sensitive user data? Print
Created by: Matt Fuller
Modified on: Sun, 10 Nov, 2019 at 12:02 PM
Did you find it helpful?Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.