IAM Permission
IAM Permissions & Deployment Strategy
To enable Tide’s ML-powered FinOps automation, our application requires specific IAM permissions to access your AWS spending data. These permissions are designed to provide minimal access necessary for operation, ensuring your sensitive information remains secure.
Tide Will NOT:
Access sensitive data or personal information
Modify or view your network configurations
Create, modify, start, stop, or pause any instances or machines
Access, alter, or duplicate any development, test, or production data
Below is an overview of Tide’s baseline IAM permissions, which are essential for the basic functionality of our application and management system, optimizing your cost-saving strategies. Some advanced products may require additional permissions—please refer to the respective product documentation for specifics.
Important Advisory: We’ve observed that some third-party services tend to grant themselves extensive permissions, which can pose security risks. We strongly recommend that you carefully review and limit these permissions before implementation. For instance, permissions such as "ec2:Describe*"
might allow third-party services to access your security groups unnecessarily, increasing the security risk without contributing to cloud cost optimization.
Tide Baseline IAM Permissions (Free & Startup Versions)
These permissions are designed for customers using the free and startup versions of Tide’s services:
Tide Premier IAM Permissions (Add-On)
For customers subscribed to our premier service tier, additional IAM permissions are required. These permissions enable more advanced features, and a separate sign-up for the premier version is necessary.
Deployment of Tide IAM Permissions
We recommend managing the deployment of IAM permissions directly through the Tide application console. However, if you prefer to deploy these permissions independently, the following methods are available:
CloudFormation Deployment
Deploy the Tide IAM permissions using AWS CloudFormation:
Click on the following link: Tide CloudFormation Quick Create
Acknowledge the terms and click “Create stack.”
Terraform Deployment
For customers using Terraform, deploy the following configuration file:
CLI Deployment
To deploy the IAM permissions using the AWS CLI, execute the following command:
AWS Console Deployment
To manually create the IAM stack via the AWS Management Console:
Navigate to CloudFormation and click “Create Stack.”
Select "Specify an Amazon S3 template URL" and paste the following URL:
Enter "TideCostAndUsageReadOnlyCloudFormationStack" as the stack name (or a name of your choice).
Proceed through the options and click “Create stack.”