Skip to content

🚀 Getting Started

This article will guide you through initial setup. At this point, you are at 5 minutes from starting saving money.


Sign-up to and setup your AWS Accounts with desired configuration for reports like communication channels and scan schedule.

Remember, unusd it's:

  • ReadOnly IAM permissions
  • 30 days free trial
  • No credit card is required
  • Cancel anytime

Add AWS Accounts

  1. Login to backstage app
  2. Add each of your AWS Accounts and desired report configuration (Email, Slack, Microsoft Teams)

Add AWS account

Then deploy the associated read-only IAM Role using the provided link to CloudFormation console:

Deploy read-only IAM Role

Repeat this operation, on every AWS account that you want to attach to your subscription.

If you have multiple AWS Accounts, prefer the usage of AWS CloudFormation StackSets feature, it will allow you to deploy the IAM Role to all your AWS Accounts with a single deployment.

💡️ Read our dedicated documentation on this method.

Add Exception tag [Optional]

To prevent alert fatigue and irrelevant reports, it may be necessary to add legitimate assets to the exception list. Typically, this can be accomplished by setting an AWS tag on an existing legitimate AWS assets.

To simplify the process, you can utilize an existing AWS tag that has already been deployed to your legitimate assets. The Key of this tag is part of the unusd configuration (Exception Tag), in the advanced menu. The default tag key is unusd.