Security is not a feature. It's the foundation.
Enterprise-grade security by default. Read-only access. Your credentials encrypted at rest.
Credential security
When you connect a cloud account, Xplorr stores your credentials (IAM role ARN, service principal ID, or service account key) in a dedicated secrets vault.
- Encrypted at rest with AES-256-GCM, the same standard used by financial institutions.
- Stored in a separate infrastructure environment from application data -- a breach of the app database does not expose credentials.
- Accessed only by the background sync process on a need-to-use basis. Credentials are decrypted in memory for the duration of the API call, then discarded.
- Never logged, never included in error reports, never transmitted to third parties.
We strongly recommend creating a dedicated read-only IAM role or service account for Xplorr, rather than using existing credentials. Our onboarding wizard generates the exact IAM policy JSON needed.
What we can and cannot do
What we can access
- Billing and cost data
- Resource metadata (instance type, region)
- CloudWatch / Azure Monitor metrics
- Cost allocation tags
What we cannot do
- Create or modify cloud resources
- Delete resources or data
- Change IAM policies or permissions
- Access your application data or databases
- Make purchases or change billing settings
- Access secrets, environment variables, or credentials
Authentication
Infrastructure
Cloud hosting
Hosted on AWS in eu-west-1 (Ireland) with multi-AZ redundancy for all stateful services.
Data encryption
All data encrypted at rest (AES-256) and in transit (TLS 1.2+). Database backups encrypted.
Network isolation
Services run in private subnets with no direct internet access. Public surface is minimal.
Backups
Automated daily database backups with 30-day retention. Point-in-time recovery enabled.
Incident response
We will notify affected users within 72 hours of any confirmed security incident, per GDPR Article 33.
Monitoring
Continuous uptime and performance monitoring with automated alerting for anomalies.
SOC 2 Type II
We are currently undergoing a SOC 2 Type II audit with an independent third-party auditor. This covers security, availability, and confidentiality. Enterprise customers can request our current security questionnaire and trust documentation.
In progress -- targeting Q3 2026
Questions or concerns?
Email our security team directly. We respond within 24 hours.
[email protected]