This article will guide you through unusd.cloud setup.
📝 Step 1: Sign-up
Sign-up on unusd.cloud to setup your AWS Accounts and preferred configuration.
- 30 days free trial
- No credit card is required
- Cancel anytime
➕ Step 2: Add AWS Accounts
- Login to unusd.cloud app
- Add each of your AWS Accounts and desired notification configuration (Email, Slack, Microsoft Teams)
Then deploy the associated read-only IAM Role using the provided link to CloudFormation console:
Repeat this operation, on every AWS account that you want to attach to your unusd.cloud subscription.
If you have multiple AWS Accounts, prefer the usage of AWS CloudFormation StackSets, it will allow you to deploy the IAM Role to all your AWS Accounts with a single deployment.
✅ Step 3: Add to Exceptionlist legitimate assets
Adding legitimate assets to the exception list is essential for unusd.cloud to avoid any alert fatigue and non-relevant reports.
Usually, you will set this tag on an existing AWS tag or a new one in your Infrastructure as Code. We assume that all assets deployed by your CI/CD Pipelines or IaC are legitimate. We are tracking here manually created over the console assets or using CLI for testing purposes.
You can use an existing tag already deployed to your legitimate assets. (Value must be