The Foreman logo The Foreman

Security & AWS Access

How The Foreman securely accesses your AWS account, and why this model is safer than long-lived access keys.

TL;DR

How Access Works

The Foreman uses AWS IAM Role Assumption with External ID protection. Instead of storing permanent credentials, each scan gets short-lived read-only credentials from AWS STS.

1. You create the role in your AWS account

You own the role and permission policy. The Foreman account is allowed to assume it with your External ID.

2. You provide role ARN + External ID

These values let The Foreman request temporary credentials for scheduled scans.

3. AWS issues temporary credentials

At scan time, STS validates trust policy + External ID and returns short-lived credentials.

4. Foreman performs read-only scans

Only metadata and metrics are fetched to detect waste. Credentials then expire automatically.

Permission Model

The Foreman requests read-only API actions to list resources and pull utilization metrics.

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "ec2:DescribeInstances",
        "ec2:DescribeVolumes",
        "ec2:DescribeSnapshots",
        "ec2:DescribeAddresses",
        "ec2:DescribeNatGateways",
        "ec2:DescribeVpcEndpoints",
        "ec2:DescribeImages",
        "rds:DescribeDBInstances",
        "rds:DescribeDBSnapshots",
        "dynamodb:ListTables",
        "dynamodb:DescribeTable",
        "ecr:DescribeRepositories",
        "ecr:DescribeImages",
        "elasticache:DescribeCacheClusters",
        "elasticloadbalancing:DescribeLoadBalancers",
        "elasticloadbalancingv2:DescribeLoadBalancers",
        "s3:ListAllMyBuckets",
        "s3:GetBucketLocation",
        "s3:GetBucketVersioning",
        "eks:ListClusters",
        "cloudwatch:GetMetricStatistics"
      ],
      "Resource": "*"
    }
  ]
}

What We Can and Can't Do

Can Do

  • Read resource metadata
  • Read CloudWatch metrics
  • List resources and configurations
  • Estimate cost impact and potential savings

Can't Do

  • Stop, start, terminate, or create resources
  • Delete databases, volumes, or snapshots
  • Modify IAM, networking, or application config
  • Read S3 objects or database content

Ready to scan with confidence?

Read-only access, temporary credentials, and full customer control.

Sign up now for a free scan