At VMPower, we're very aware of the importance of security around your cloud subscription access. We take this responsibility very seriously and employ strong measures to ensure secure access to your cloud subscription.
For AWS, we ask our users to generate an Identity and Access Management (IAM) user for VMPower. This credential allows VMPower to monitor and perform actions that only have been explicitly authorized by you. It can be revoked at anytime from AWS.
VMPower employs FIPS 140-2 hardware security modules (HSMs) (the same level of encryption used by federal government organizations) via Azure Keyvault, Microsoft's premier cryptographic key service, to store your IAM secret.
For Azure, VMPower employs Azure Active Directory OAuth to access your Azure subscriptions (this is the same process as logging into the Azure portal). What that means is that VMPower never collects long-lasting credentials from you but rather installs VMPower as an Azure Active Directory application into your subscription. This application can be removed from your directory directly from Azure at any time.
This ensures that VMPower, and only VMPower can access your Azure subscription and perform actions that you explicitly request.
What Data Does VMPower Collect?
VMPower never attempts to read or directly access your Virtual Machines. That is, we will never access personally identifiable or even application-specific data. Rather, VMPower only employs information available on your cloud platform. This data includes:
- VM Memory Consumption
- VM CPU Utilization
- VM Disk Utilization
- VM Disk Counts
- VM Specs
- VM State