Migration Assessment Connection & Access
Technical access requirements for a Cloudsaver Connected Migration Assessment. This page describes the read-only access we need on your source cloud to perform workload discovery, optimization analysis, and like-for-like cost modeling. Engagement scope and deliverables are defined in your SOW.
- All access is read-only. We do not modify resources, change configurations, or execute any changes in your environment. The single exception is one storage resource created for billing data export where required by the provider.
- This is an analytical assessment. No workloads are deployed on the target provider during the engagement. All analysis is performed within Cloudsaver-managed infrastructure.
- Revoke at any time. You retain full control of every role, policy, and credential. Access can be removed in a single step.
Connection Requirements
Select your source cloud below to see the exact access requirements.
Security and Data Handling
- Compliance: SOC 2 Type II compliant. DPA and sub-processor list available on request.
- Encryption: All data encrypted in transit (TLS 1.2+) and at rest.
- Access controls: Customer data access restricted to analysis team, gated by SSO and MFA, and logged.
- Storage: Analysis performed within Cloudsaver-managed infrastructure in the United States.
- Retention: Raw customer data is not retained after the engagement concludes.
- Data use: Customer data is never shared, resold, or used to train any models.
- Revocation: All access can be revoked at any time by removing the IAM role, App Registration, deployment, or service account.
Want to see how this applies to your environment?
Get your free savings assessment