CloudReview scans your AWS account across 21 services, identifies waste with AI precision, and tells you exactly what to fix — in under 60 seconds. No agents. No broad permissions.
No installation. No agent deployment. No long-term credentials. Just a read-only IAM role deployed in 60 seconds.
Click a pre-filled CloudFormation link. A read-only IAM role deploys in your AWS account in about 60 seconds. No credentials leave your account — CloudReview assumes the role on each scan.
CloudReview calls AWS read-only APIs across EC2, EBS, RDS, S3, Lambda, ElastiCache, and 15 more. Each finding is enriched by Claude AI with a plain-English explanation and fix instructions.
Many findings are auto-fixable. CloudReview shows you a dry-run preview — the exact AWS API calls it will make — before executing. Rollback instructions included for every automated fix.
Built from real AWS cost audits. Each service has multiple detection rules targeting waste patterns that AWS doesn't surface in Cost Explorer.
Not vague recommendations. Specific resources, specific costs, specific fix instructions.
Security-conscious teams should scrutinise any tool that touches AWS. Here's exactly what CloudReview can and cannot do.
The IAM role uses AWS managed ReadOnlyAccess plus Cost Explorer and CloudWatch metrics. No iam:*, no ec2:Modify*, no write actions of any kind.
CloudReview assumes your role using a unique ExternalId per organisation — preventing confused deputy attacks where a third party tricks CloudReview into accessing your account.
STS temporary credentials are used per scan and never persisted. Your long-term IAM keys never leave your account.
Because CloudReview uses assume-role, every API call appears in your CloudTrail logs attributed to the CloudReview role. Full audit trail, your account.
{ "Version": "2012-10-17", "Statement": [{ "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::CLOUDREVIEW:root" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "sts:ExternalId": "cr-a7f3c91d..." } } }] } // Permissions policy: ReadOnlyAccess (AWS managed) // + ce:Get* (Cost Explorer) // + cloudwatch:GetMetricData // No write permissions of any kind.
Fixed monthly fee. Unlimited value. Cancel anytime.
ReadOnlyAccess policy plus Cost Explorer read APIs (ce:Get*) and CloudWatch metrics (cloudwatch:GetMetricData). No write, modify, delete, or IAM management permissions of any kind. The full policy is open-source and visible before you deploy.