Configuration
AWS Integration Setup Guide
Requirements
An active Nullify tenant.
AWS permissions to create IAM roles and (optionally) deploy CloudFormation StackSets.
Access to Terraform or CloudFormation tooling.
Setup Overview
Nullify uses cross-account IAM roles to ingest metadata from your AWS accounts. The dashboard supplies the parameters you need to deploy our CloudFormation or Terraform template.
Information You Provide
IAM role name to create within your accounts (for example
nullify-cross-account-role).Target account IDs that Nullify should monitor.
Parameters Supplied by Nullify
Nullify role ARN for the external principal.
External ID to enforce a trusted relationship.
S3 bucket name for encrypted data transfer when required.
All example identifiers below are placeholders—replace them with the values displayed in your tenant.
Setup Steps
Open the Nullify console:
Configure → Integrations → AWS.Enter your role name and list of account IDs.
Download the deployment template (CloudFormation or Terraform) with your tenant-specific parameters embedded.
Deploy the template:
Single account: Launch via AWS Console, CLI, or your preferred IaC workflow.
Multiple accounts: Use CloudFormation StackSets or Terraform loops. Ensure the role name is consistent across accounts.
Verify the integration: return to the Nullify console to confirm that the role can be assumed.
Deployment Modes
Single Account
Deploy the template directly into the account hosting your workloads. Grant the cross-account role permission to discover resources in the regions you care about.
Multi-Account / AWS Organizations
Use StackSets or Terraform to roll out the integration across member accounts. Deploy the role to both the management and member accounts so Nullify can analyse shared services and spokes.
The current release expects the same IAM role name in every account. Contact support if you require per-account variation.
Validation Checklist
Account IDs are valid 12-digit numbers.
The IAM role exists and trusts the Nullify role ARN with the provided external ID.
The permissions policy matches the template (least privilege for discovery only).
Troubleshooting
Role not found — Confirm the StackSet or Terraform run succeeded in each account.
Access denied — Verify the trust policy includes the Nullify role ARN and external ID.
Stale data — Make sure CloudTrail/Config events are flowing if you rely on change detection.
Kubernetes Optional Add-on
Quick Start
Navigate to Integrations
Log in to your Nullify dashboard
Go to Configure > Integrations
Select AWS integration
Configure Integration
Provide your IAM role name
Specify target AWS account IDs
Download the CloudFormation or Terraform template
Deploy Template
Deploy the template to your AWS account(s)
For multi-account setups, use CloudFormation StackSets
Documentation
The repository includes:
Complete installation guides
Multi-account and organization-wide deployment instructions
Configuration examples
Troubleshooting guides
Security and permissions details
Kubernetes Integration
Quick Start
Deploy the Nullify Kubernetes collector to scan your clusters for vulnerabilities.
Prerequisites
Kubernetes cluster (EKS, GKE, AKS, or self-managed)
Helm v3 installed
AWS account with Nullify integration configured
Installation
For complete installation instructions, configuration options, and troubleshooting:
To relate Kubernetes workloads back to AWS accounts, deploy the Nullify Kubernetes Collector. The Helm chart includes installation instructions, configuration samples, and troubleshooting guidance.
Last updated
Was this helpful?

