CloudPi is designed to help teams understand cloud usage, cost, inventory, and governance posture without becoming a control risk inside the environment it monitors. This page is intended as a concise security overview for procurement, platform, IT, and security review.
The central security question for most evaluators is what permissions are required and what the platform can do with them. CloudPi's public posture is strongest when access remains observational rather than operationally invasive.
CloudPi is positioned to retrieve usage, billing, inventory, and configuration-related information for analytics, reporting, optimization, and governance visibility.
Read-only or view-oriented access reduces blast radius, supports separation of duties, and simplifies internal approval review compared with broader control-plane permissions.
The current public posture is based on encrypted handling, limited-access integration, and review of collected cloud and account data within the privacy policy.
| Data in transit | Public messaging states that data is protected in transit using standard safeguards. |
|---|---|
| Data at rest | Public messaging also states that data is protected at rest, which is important for usage, billing, and configuration-related information. |
| Data scope | CloudPi is intended to retrieve cloud usage, cost, inventory, and configuration-related information to support reporting, optimization, and governance workflows. |
| Privacy alignment | Security review should be done together with privacy review so collection, use, and handling expectations are evaluated in one place. |
CloudPi's public materials point toward regular review, operational checks, and a narrow-access posture rather than a highly privileged control-plane model.
CloudPi's broader product story includes governance, policy controls, approval workflows, and audit-oriented operations, which supports more accountable and reviewable operating processes.
These answers are intended to support an initial security review before deeper questionnaire or architecture discussions.
The current public positioning emphasizes read-only or view-oriented access for analytics and monitoring workflows. That reduces risk by limiting the platform's ability to modify customer cloud resources.
CloudPi is intended to retrieve cloud usage, cost, inventory, and configuration-related information so teams can understand spend, optimize resources, and strengthen governance across environments.
Public messaging states that data is protected in transit and at rest using standard encryption practices, with broader safeguards reinforced through privacy commitments and ongoing operational review.
No. This page is a starting point for vendor review. Additional diligence may include permission scoping, privacy review, architecture discussion, and security questionnaire responses.