Overview
The Amazon ECR (Elastic Container Registry) integration allows Backline to scan your container images for security vulnerabilities. Identify and remediate security issues in your Docker images before they reach production.What You Can Do
With the ECR integration, Backline can:- Scan container images for vulnerabilities
- Analyze image layers and dependencies
- Detect outdated base images
- Track vulnerabilities across image versions
- Monitor container security compliance
Prerequisites
Before connecting ECR, ensure you have:- An AWS account with ECR repositories
- Permissions to deploy CloudFormation stacks (requires IAM role creation)
- Your 12-digit AWS Account ID
Connecting ECR
Deploy CloudFormation Stack
Click the CloudFormation link in Backline or use the direct link below to deploy the integration role in your AWS account:Deploy CloudFormation StackEnter a unique External ID when prompted. This value secures the cross-account trust relationship.
Get Stack Outputs
After the stack completes, go to the Outputs tab and copy the Role ARN and External ID.
Enter Integration Details
In Backline, enter:
- Account ID: Your 12-digit AWS account ID
- External ID: The value you provided during stack creation
- Role ARN: The ARN from the CloudFormation outputs
Alternative: Manual Role Creation
If you cannot use CloudFormation or prefer to create IAM resources manually, follow these steps:Create the IAM Role
In the AWS IAM Console, create a new role named Replace
BacklineECRIntegrationRole with the following trust policy:<YOUR_EXTERNAL_ID> with a unique, secure string of at least 8 characters. Save this value—you’ll need it when configuring Backline.Attach the Permissions Policy
Create and attach an inline policy named Replace
CustomerECRReadPolicy with the following permissions:<YOUR_ACCOUNT_ID> with your 12-digit AWS account ID.Copy the Role ARN
After creating the role, copy its ARN from the role summary page. It will look like:
arn:aws:iam::<YOUR_ACCOUNT_ID>:role/BacklineECRIntegrationRoleComplete Integration in Backline
Return to the Enter Integration Details step above and enter your Account ID, External ID, and Role ARN.
Required IAM Permissions
The CloudFormation template creates a role with the following permissions:Security Model
Backline uses secure cross-account role assumption to access your ECR:- Backline assumes its own integration role
- That role then assumes the
BacklineECRIntegrationRolein your account - The External ID prevents unauthorized access (confused deputy protection)
After Connection
Once ECR is connected, Backline will:- Discover your ECR repositories
- Begin scanning container images
- Identify vulnerabilities in image layers
- Generate remediation recommendations
Image Scanning
Backline scans:- All tagged images in connected repositories
- Base image vulnerabilities
- Package and dependency vulnerabilities within containers
- Configuration issues
Large images may take several minutes to scan initially. Subsequent scans are incremental and faster.
Managing the Integration
Updating Configuration
To update the integration settings:- Open the Integration Hub
- Click on the ECR integration
- Update the Account ID, External ID, or Role ARN as needed
- Test and save
Disconnecting
To remove the ECR integration:- Go to the Integration Hub
- Click on the ECR integration
- Select Disconnect
- Confirm your choice