Overview
Connect your AWS Organization so Backline can securely pull cloud context for richer risk analysis and smarter remediation. By integrating with AWS, Backline gains visibility into your runtime environment — including network exposure, security groups, and deployment topology — to determine whether a vulnerability is actually exploitable in your specific infrastructure. This moves security prioritization from theoretical severity (CVSS scores) to contextual exploitability.What You Can Do
With the AWS Cloud integration, Backline can:- Assess whether vulnerabilities are actually exploitable in your AWS environment
- Analyze network exposure, security groups, and subnet configurations to determine reachability
- Identify whether vulnerable workloads are running, stopped, or isolated
- Provide evidence-backed exploitability verdicts with cloud context (e.g., “Service is in a private subnet with no public IP”)
- Monitor EC2, ECS, EKS, and Lambda workloads for runtime security context
- Support multiple AWS accounts and organizations from a single Backline workspace
Prerequisites
Before connecting AWS Cloud, ensure you have:- An AWS account with appropriate IAM permissions
- Permissions to deploy CloudFormation stacks (requires IAM role creation)
- Your 12-digit AWS Account ID
Connecting AWS Cloud
Deploy CloudFormation Stack
Click the CloudFormation link in Backline or use the direct link below to deploy the integration role in your AWS account:Deploy CloudFormation StackThe stack creates an IAM Role in your account with:
- Backline’s AWS Account as the trusted principal
- Your tenant-specific External ID in the trust policy
- Read-only permissions for security context collection
Enter Connection Details
In Backline, enter:
- Account ID: Your 12-digit AWS Account ID
- External ID: The pre-generated External ID shown in the setup screen
- Role ARN: The ARN from the CloudFormation outputs
- Regions: One or more AWS regions you want Backline to scan for cloud context
Alternative: Deploy via CloudFormation StackSet
If you need to deploy the IAM Role across multiple accounts in your AWS Organization, use a CloudFormation StackSet instead of a single stack.Create the StackSet
In the AWS Console, navigate to CloudFormation → StackSets and create a new StackSet using the template URL:Deploy the StackSet to your target accounts and regions.
Get Stack Outputs
Once the StackSet deployment completes, navigate to the Stack instances tab, select a stack instance, and open its Outputs tab. Copy the Role ARN value.
Complete Integration in Backline
Return to the Enter Connection Details step above and enter your Account ID, External ID, Role ARN, and Regions.
After Connection
Once connected, Backline begins collecting cloud context from your AWS environment, including:- Network topology: VPC, subnet, public/private exposure, load balancers
- Security groups: Inbound/outbound rules, public accessibility
- Runtime state: Whether workloads are running, stopped, or unknown
- Service configuration: Authentication requirements, exposed ports
“This vulnerability is not exploitable because the affected service is not reachable from the internet. The workload runs in a private VPC subnet, has no public IP or public load balancer, and is protected by a security group that blocks inbound traffic from 0.0.0.0/0.”
Connecting Multiple AWS Accounts
AWS Cloud supports multiple connections, allowing you to monitor several AWS organizations or accounts from a single Backline workspace.Open Integration Details
Go to the AWS Cloud integration card in the Integration Hub and click Configure to open the integration details.
Enter New Account Credentials
Provide the Account ID, External ID, Role ARN and Regions for the additional AWS account or organization.
EKS Access Configuration
This step is required only if you have EKS clusters and want Backline to read Kubernetes resources (pods, deployments, services, etc.).
Why This Is Needed
AWS EKS uses two layers of authorization:- IAM permissions - Controls access to AWS EKS APIs (handled by the CloudFormation stack)
- Kubernetes RBAC - Controls access to Kubernetes resources within the cluster
Configure EKS Access
Run the following script to configure access for all EKS clusters in your AWS account. Replace<YOUR_BACKLINE_ROLE_ARN> with the Role ARN from your CloudFormation stack outputs.
Configure a Single Cluster
To configure access for a specific cluster instead of all clusters:Adding New EKS Clusters
When you create new EKS clusters, run the access entry commands again to grant Backline access to the new clusters.Troubleshooting EKS Access
If Backline cannot read Kubernetes resources from your EKS clusters:-
Verify access entry exists:
-
Check associated policies:
- Verify the policy is AmazonEKSViewPolicy with cluster scope.