...
Anchor | ||||
---|---|---|---|---|
|
...
RBAC-based access to limit regions and services to compliant regions and services for each user and organization | |
Compute instances number limit can be enforced | |
Storage Size limit can be enforced on object storages, file storages, block storages and block snapshots | |
Spot Usage can be restricted | |
Spot Management and safeguarding | |
Email notifications to individual users and admins for warnings and critical events | |
Cloud accounts get automatically disabled if keys get compromised or in case of an abuse | |
Automatic handling of abuse reports on all accounts |
|
Immediate reset of any compromised access keys signaled by cloud provider | |
Regular reset of cloud access keys on all cloud accounts | |
Auto-stop idle compute instances |
|
Auditing of all users actions | |
Auditing of all cloud accounts actions |