- Credential Encryption: All cloud provider credentials are encrypted at rest
- Least Privilege: Zero-X requests only the minimum permissions needed for security scanning
- Credential Isolation: Credentials are never shared between organizations
- Access Revocation: You can revoke access at any time by disconnecting data sources