AWS Waste Scanner
Automatically detect unused AWS resources and reduce cloud waste.
Many AWS accounts accumulate thousands of dollars per year in unused resources. Waste Scanner identifies these automatically with minimal infrastructure to deploy.
No agents. No software. Minimal infrastructure.
Features
- Set exclusion tags
- Scan AWS regions configured by you
- Get daily reports via SNS
- Usage-based pricing based on the number of resources scanned
Find EC2 Waste
- Detect stale snapshots
- Detect unattached volumes
- Detect unused Elastic IPs
Coming Soon
- S3 buckets
- Reporting Improvements
- Idle and stale EC2 instances
- RDS snapshots
How It Works
Security
The IAM role remains fully under your control. It grants read-only access to resource metadata only.
Waste Scanner cannot create, modify, or delete any resources in your account and does not access application data.
The Waste Scanner service runs entirely within AWS-managed infrastructure. Infrastructure is built using AWS managed services, which inherit AWS security controls.
Our service roles use least-privilege IAM.
Data Handling
Waste Scanner processes resource metadata obtained via the cross-account IAM role.
Metadata necessary for reporting is temporarily stored in an encrypted S3 bucket in the us-east-2 region. Stored metadata is retained only as long as necessary to generate reports.
Customer metadata is logically isolated using account-specific prefixes within an access-controlled S3 bucket.
No customer application data is accessed or stored.
Reports are delivered directly to your SNS topic within your AWS account.
Tag keys are inserted into your reports.
Encryption
Waste Scanner uses AWS-managed encryption for data at rest and TLS for data in transit.
We do not manage or store customer encryption keys directly.
Getting Started
- Set up an AWS IAM role
- Set up an SNS topic and subscribe to it
- Set up SSM parameters
- Customize the configuration file and place it in S3
- Subscribe via the AWS Marketplace
AWS IAM
- A trust relationship (assume-role policy)
- The minimum permissions defined below
Variables to replace
- ${CUSTOMER_ACCOUNT} - your AWS account number
- ${CUSTOMER_CONFIG_BUCKET_NAME} - S3 bucket name containing the Waste Scanner configuration file
SNS
JSON
Variables to replace
- ${CUSTOMER_ACCOUNT} - your AWS account number
- ${SNS_TOPIC_ARN} - ARN of the SNS topic
- ${WASTE_SCANNER_IAM_ROLE_ARN} - ARN of the IAM role
AWS SSM Parameters
These parameters must be created in the us-east-2 region, which is the control region used by Waste Scanner.
- /waste-scanner/s3-bucket - Name of the S3 bucket containing your config.yaml file, for example: my-bucket
- /waste-scanner/s3-region - Region of the S3 bucket containing your config.yaml file, for example: us-east-1
- /waste-scanner/s3-key - Full key, including prefix, of your config.yaml file, for example: /path/to/waste-scanner/config.yaml
- /waste-scanner/sns-arn - SNS ARN to which the waste scanner can report its findings, for example: arn:aws:sns:us-west-2:123456789012:topic/waste-scanner