|
| 1 | +--- |
| 2 | +page_title: Correlate findings with AWS Secrets Manager |
| 3 | +description: >- |
| 4 | + Correlate findings from HCP Vault Radar with secrets stored in AWS Secrets Manager. |
| 5 | +--- |
| 6 | + |
| 7 | +# Correlate findings with AWS Secrets Manager |
| 8 | + |
| 9 | +When HCP Vault Radar connects to AWS Secrets Manager, Vault Radar can correlate |
| 10 | +findings with secrets stored in AWS Secrets Manager. This allows you to identify |
| 11 | +what secrets you need to rotate. |
| 12 | + |
| 13 | +## Connect AWS Secrets Manager |
| 14 | + |
| 15 | +Before you can correlate findings with AWS Secrets Manager, you need to [deploy |
| 16 | +the Radar agent](/hcp/docs/vault-radar/agent/deploy). Once you deploy the agent, |
| 17 | +you can configure and connect AWS Secrets Manager to the agent. |
| 18 | + |
| 19 | +## Prerequisites |
| 20 | + |
| 21 | +You need one of the following AWS authentication methods: |
| 22 | + |
| 23 | +- IAM role authentication with an EC2 instance or configured IAM role |
| 24 | +- Environment variables authentication with AWS Access Key ID and Secret Access Key |
| 25 | + |
| 26 | +Both authentication methods support an optional assume role ARN for |
| 27 | +cross-account access or elevated permissions. For more information about |
| 28 | +assuming roles, refer to the [AWS STS AssumeRole |
| 29 | +documentation](https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html). |
| 30 | + |
| 31 | +### Required permissions |
| 32 | + |
| 33 | +The IAM user, role, or assumed role must have the following permissions: |
| 34 | + |
| 35 | +| Service | Permission | Documentation | |
| 36 | +|---------|------------|---------------| |
| 37 | +| Secrets Manager | `secretsmanager:ListSecrets` | [ListSecrets API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecrets.html) | |
| 38 | +| Secrets Manager | `secretsmanager:DescribeSecret` | [DescribeSecret API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DescribeSecret.html) | |
| 39 | +| Secrets Manager | `secretsmanager:GetSecretValue` | [GetSecretValue API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html) | |
| 40 | +| Secrets Manager | `secretsmanager:ListSecretVersionIds` | [ListSecretVersionIds API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecretVersionIds.html) | |
| 41 | +| EC2 | `ec2:DescribeRegions` | [DescribeRegions API](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeRegions.html) | |
| 42 | +| STS | `sts:GetCallerIdentity` | [GetCallerIdentity API](https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html) | |
| 43 | + |
| 44 | +**Example AWS IAM policy:** |
| 45 | + |
| 46 | +```json |
| 47 | +{ |
| 48 | + "Version": "2012-10-17", |
| 49 | + "Statement": [ |
| 50 | + { |
| 51 | + "Effect": "Allow", |
| 52 | + "Action": [ |
| 53 | + "secretsmanager:ListSecrets", |
| 54 | + "secretsmanager:DescribeSecret", |
| 55 | + "secretsmanager:GetSecretValue", |
| 56 | + "secretsmanager:ListSecretVersionIds" |
| 57 | + ], |
| 58 | + "Resource": "*" |
| 59 | + }, |
| 60 | + { |
| 61 | + "Effect": "Allow", |
| 62 | + "Action": [ |
| 63 | + "ec2:DescribeRegions" |
| 64 | + ], |
| 65 | + "Resource": "*" |
| 66 | + }, |
| 67 | + { |
| 68 | + "Effect": "Allow", |
| 69 | + "Action": [ |
| 70 | + "sts:GetCallerIdentity" |
| 71 | + ], |
| 72 | + "Resource": "*" |
| 73 | + } |
| 74 | + ] |
| 75 | +} |
| 76 | +``` |
| 77 | + |
| 78 | +## Agent configuration with AWS Secrets Manager |
| 79 | + |
| 80 | +Set up and manage AWS Secrets Manager from the Vault Radar module in the [HCP |
| 81 | +Portal](https://portal.cloud.hashicorp.com/). |
| 82 | + |
| 83 | +1. Click **Settings**. |
| 84 | + |
| 85 | +1. Click **Secret Managers**. |
| 86 | + |
| 87 | +1. Click **Connect new secret manager**. |
| 88 | + |
| 89 | +1. Select **AWS Secrets Manager** and click **Next**. |
| 90 | + |
| 91 | +1. Select an AWS authentication method from the **Authentication method** pulldown menu. |
| 92 | + |
| 93 | +1. Enter the details for the selected method and click **Next** to validate the connection. |
| 94 | + |
| 95 | + <Tabs> |
| 96 | + <Tab heading="IAM Role"> |
| 97 | + |
| 98 | + - Select **IAM Role** if you want to use instance profile or role-based authentication. |
| 99 | + |
| 100 | +  |
| 101 | + |
| 102 | + - (Optional) Enter an assume role ARN in the **Assume Role ARN** text field if you need to assume a different role for access. |
| 103 | + |
| 104 | + </Tab> |
| 105 | + <Tab heading="Environment Variables"> |
| 106 | + |
| 107 | + - Select **AWS Credentials from environment variables** if you want to use access keys. |
| 108 | + |
| 109 | +  |
| 110 | + |
| 111 | + - Enter your AWS Access Key ID location in the **AWS Access Key ID Env variable** text field (default: `env://AWS_ACCESS_ID_LOCATION`). |
| 112 | + |
| 113 | + - Enter your AWS Secret Access Key location in the **AWS Secret Access Key Env variable** text field (default: `env://AWS_SECRET_KEY_LOCATION`). |
| 114 | + |
| 115 | + - (Optional) Enter an assume role ARN in the **Assume Role ARN** text field if you need to assume a different role for access. |
| 116 | + |
| 117 | + </Tab> |
| 118 | + </Tabs> |
| 119 | + |
| 120 | +Vault Radar fetches all active regions for the account and automatically starts index scan for each region. |
0 commit comments