This article will guide you through unusd.cloud setup.
📝 Step 1: Sign-up
Sign-up on unusd.cloud to setup your AWS Accounts and preferred configuration.
- Free forever for a single AWS Account
- No credit card is required
- Cancel anytime
- ReadOnly permissions
➕ Step 2: Add AWS Accounts
- Login to unusd.cloud app
- Add each of your AWS Accounts and desired notification configuration (Email, Slack, Microsoft Teams)
Then deploy the associated read-only IAM Role using the provided link to CloudFormation console:
Repeat this operation, on every AWS account that you want to attach to your unusd.cloud subscription.
If you have multiple AWS Accounts, prefer the usage of AWS CloudFormation StackSets, it will allow you to deploy the IAM Role to all your AWS Accounts with a single deployment.
✅ [Optional] Step 3: Add Exception tag to legitimate AWS assets
To prevent alert fatigue and irrelevant reports, it may be necessary to add legitimate assets to the exception list. Typically, this can be accomplished by setting a tag on an existing legitimate AWS assets.
To simplify the process, you can utilize an existing AWS tag that has already been deployed to your legitimate assets. The Key
of this tag is part of the unusd configuration (Exception Tag), in the advanced menu. The default tag key is unusd
.