Prerequisites
Prerequisites for AWS Integration
Requirements
An active Nullify account
AWS account with permissions to create IAM roles
Access to AWS CloudFormation or Terraform
Deployment Steps
Access Integration Templates
Log in to your Nullify dashboard
Navigate to Integrations > AWS
Download either the CloudFormation or Terraform template
Deploy the Template
CloudFormation:
Single account: Deploy through AWS Console or AWS CLI or IaC
Multi-account: Deploy using AWS CloudFormation StackSets
Terraform: Apply using your existing Terraform workflow
Verify Connection
Return to Nullify dashboard
Confirm successful integration status on next scheduled run
Multi-Account Setup
For organizations managing multiple AWS accounts, we recommend using CloudFormation StackSets to deploy the integration across your organization. This ensures consistent deployment and easier management of the Nullify Integrations across your AWS landscape.
Kubernetes Integration
Nullify's Kubernetes integration enables security scanning of your Kubernetes clusters to identify vulnerabilities and misconfigurations. The integration deploys a collector that gathers cluster information and securely transmits it to Nullify for analysis.
Benefits
Identifies Code specific vulnerabilities that can be exploited using security misconfigurations
Detects vulnerable workloads and container images
Provides remediation guidance for Kubernetes resources
Minimal resource footprint
Prerequisites For Helm Installation
Kubernetes cluster (EKS, GKE, AKS, or self-managed)
Helm v3 installed
AWS account with Nullify integration configured
Using Terraform
If you're using Terraform to deploy the Nullify AWS integration, you can automatically deploy the Kubernetes collector by setting the enable_kubernetes_integration
boolean to true
in your Terraform configuration(But we recommend using the helm charts):
Using Nullify Dashboard
Log in to your Nullify dashboard
Navigate to the Explore > Asset Inventory > Host Catalogue > New Host Scan
Download the customized Helm chart (k8s-collector.tgz) specific to your account and use values.yaml to customize information really specific to your organization
Install using the downloaded chart:
Configuration
The collector can be customized by modifying the values.yaml file:
Note: Helm Charts can only be deployed after the IAM role have been provisioned in your cloud accounts and upon installation please share the IAM role arn with us through slack.
Security Note
The deployed templates create IAM roles with permissions that allows Nullify to securely collect only the necessary information for vulnerability analysis.
Need Help?
For deployment issues: contact support@nullify.ai
Last updated
Was this helpful?