FAQ
CloudSploit uses the AWS-recommended best practice for connecting: a third-party cross-account role. This is an IAM role that you create and then give Clo...
Sat, 23 Jul, 2016 at 12:00 AM
CloudAccess AWS IAM Role with SecurityAudit Policy Azure App with SecurityReader Role GCP Service Account with Viewer Access Oracle API Use...
Tue, 28 Jan, 2020 at 3:15 PM
No. We use Stripe, a secure and accredited third-party payment processing platform which allows us to collect payment information without that information...
Sat, 23 Jul, 2016 at 12:01 AM
We store: email addresses, AWS IAM role IDs, external IDs, and scan results, as well as creation times and database IDs for each resource.
Sat, 23 Jul, 2016 at 12:01 AM
You can close your account at any time. If you need to have your data removed within a specific timeframe, please contact CloudSploit support to request a ...
Sun, 10 Nov, 2019 at 12:03 PM
Visit the Password Reset page and enter your email. You will receive a reset link to a page that will prompt you for a new password.
Sat, 23 Jul, 2016 at 12:03 AM
When using a standard email and password for login, we do not support MFA. However, we do support third-party login solutions, including Google and Amazon...
Sat, 13 Aug, 2016 at 1:13 AM
Yes. Enabling the CloudSploit Audit Logs (via the “Account Settings” page of the console) enables audit logging of user logins and account changes. Note tha...
Sun, 10 Nov, 2019 at 12:02 PM
Yes. CloudSploit stores full account logs for every API call made to its endpoint for at least 90 days. CloudSploit Audit Logs are a subset of these logs sh...
Sun, 10 Nov, 2019 at 12:02 PM
Throughout the course of account signup and user activity, CloudSploit collects at least the following information. user email addresses IP addresses us...
Wed, 19 Feb, 2020 at 5:35 PM