Sign up
Create your account
Go to infraaudit.dev and click Get started. Sign up with Google, GitHub, or an email address and password.
Connect your AWS account
Cloud accounts are called providers in InfraAudit. You connect one from the Cloud Providers page.Enter your credentials
Fill in the form:
| Field | What to enter |
|---|---|
| Access Key ID | From an IAM user or assumed role |
| Secret Access Key | The corresponding secret |
| Region | Your primary region (e.g. us-east-1) |
| Display name | Any label you like, e.g. “Production” |
Required AWS permissions
Read-only access is enough to get started. Attach this IAM policy to the user or role whose credentials you’re providing:Vulnerability scanning and IaC drift detection run entirely against data already ingested into InfraAudit. No additional AWS permissions are needed for those features.
Connecting GCP or Azure
The connection flow is the same. See Connecting cloud accounts for the GCP service account and Azure service principal setup instructions.Run your first drift scan
Once the initial sync finishes, the resource count on the Cloud Providers card updates. Now you can run a drift scan.Trigger the scan
Click Run scan. InfraAudit compares the current state of your resources against the baseline captured during the initial sync.
What to do next
Browse your resources
Click Resources in the sidebar to see everything InfraAudit discovered, filterable by type, region, and status.
Enable a compliance framework
Go to Compliance and enable the CIS AWS Benchmark to get a scored assessment with control-level findings.
Set up alerts
Go to Settings → Notifications and connect a Slack channel or email address to receive alerts.
Review cost data
Billing data syncs daily. The Cost section shows historical spend, trends, and savings recommendations.
Further reading
- Platform guide — full walkthrough of every section of the UI
- CLI quickstart — do everything above without leaving the terminal
- Connecting cloud accounts — full credential requirements for each provider