Overview
ZapStack requires read-only access to your AWS resources to identify optimization opportunities. We follow the principle of least privilege, requesting only the permissions necessary for our checks.Permission Categories
Resource Discovery
Permissions to list and describe resources:CloudWatch Metrics
Permissions to read utilization metrics:Cost & Usage
Permissions to estimate savings:Full Policy Document
Complete IAM Policy
Complete IAM Policy
Trust Policy
The IAM role trust policy should allow ZapStack to assume the role:Security Considerations
What We Can Access
- Resource metadata (IDs, configurations, tags)
- CloudWatch metrics (CPU, memory, network utilization)
- Cost and usage data
What We Cannot Access
- Data stored in S3 buckets
- Database contents
- Secrets or credentials
- Application logs
External ID
We use an external ID in the trust policy to prevent the confused deputy problem. Your external ID is unique to your organization and shown in your dashboard.Revoking Access
To revoke ZapStack’s access:- Delete the CloudFormation stack, or
- Delete the IAM role directly

