How we protect your data and your AWS environment.
uptime.cx connects to your AWS account through a dedicated IAM role with read-only permissions. The role is created via a CloudFormation stack that you deploy in your own account, giving you full visibility and control over exactly what is granted.
Describe*, List*, and Get* actions. We cannot create, modify, or delete any resource in your account.| Component | Provider | Region |
|---|---|---|
| Web application | Vercel | Global edge network |
| Database | Neon (PostgreSQL) | AWS us-east-1 |
| Scanner compute | AWS ECS Fargate | AWS us-east-1 |
| Scan queue | AWS SQS | AWS us-east-1 |
| Container registry | AWS ECR | AWS us-east-1 |
| Secrets | AWS Secrets Manager | AWS us-east-1 |
For AI-assisted reliability analysis, we send resource configuration summaries to Google Gemini. These summaries include resource types, region placements, relationships, and configuration attributes relevant to reliability (e.g., Multi-AZ settings, backup retention periods).
We do not send:
Google Gemini API calls are made with the data-use opt-out setting enabled where available. Prompts and responses are not used by Google for model training.
| Subprocessor | Purpose | Location |
|---|---|---|
| Amazon Web Services (AWS) | Scanner compute, queue, secrets, container registry | United States |
| Neon | PostgreSQL database hosting | United States |
| Vercel | Web application hosting, edge compute | Global |
| Clerk | Authentication, user management | United States |
| Stripe | Payment processing, billing | United States |
| Google (Gemini AI) | AI-assisted reliability analysis | United States |
If you discover a security vulnerability, please report it responsibly by emailing support@uptimecx.com with the subject line "Security Vulnerability Report." We will acknowledge your report within 48 hours and work with you to address the issue.