You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/hcp-docs/content/docs/vault-radar/agent/correlate-aws-secrets-manager.mdx
+45-31Lines changed: 45 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,20 +6,27 @@ description: >-
6
6
7
7
# Correlate findings with AWS Secrets Manager
8
8
9
-
When HCP Vault Radar connects to AWS Secrets Manager, Vault Radar can correlate findings with secrets stored in AWS Secrets Manager. This allows you to identify what secrets you need to rotate.
9
+
When HCP Vault Radar connects to AWS Secrets Manager, Vault Radar can correlate
10
+
findings with secrets stored in AWS Secrets Manager. This allows you to identify
11
+
what secrets you need to rotate.
10
12
11
13
## Connect AWS Secrets Manager
12
14
13
-
Before you can correlate findings with AWS Secrets Manager, you need to [deploy the Radar agent](/hcp/docs/vault-radar/agent/deploy). Once you deploy the agent, you can configure and connect AWS Secrets Manager to the agent.
15
+
Before you can correlate findings with AWS Secrets Manager, you need to [deploy
16
+
the Radar agent](/hcp/docs/vault-radar/agent/deploy). Once you deploy the agent,
17
+
you can configure and connect AWS Secrets Manager to the agent.
14
18
15
19
## Prerequisites
16
20
17
-
You need one of the following authentication methods:
21
+
You need one of the following AWS authentication methods:
18
22
19
23
- IAM role authentication with an EC2 instance or configured IAM role
20
24
- Environment variables authentication with AWS Access Key ID and Secret Access Key
21
25
22
-
Both authentication methods support an optional assume role ARN for cross-account access or elevated permissions. For more information about assuming roles, refer to the [AWS STS AssumeRole documentation](https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html).
26
+
Both authentication methods support an optional assume role ARN for
27
+
cross-account access or elevated permissions. For more information about
@@ -36,37 +43,44 @@ The IAM user, role, or assumed role must have the following permissions:
36
43
37
44
## Agent configuration with AWS Secrets Manager
38
45
39
-
Set up and manage AWS Secrets Manager from the Vault Radar module in the [HCP Portal](https://portal.cloud.hashicorp.com/). Select **Settings**, then **Secret Managers**, and then click **Connect new secret manager**.
46
+
Set up and manage AWS Secrets Manager from the Vault Radar module in the [HCP
47
+
Portal](https://portal.cloud.hashicorp.com/).
40
48
41
-
1. Select **AWS Secrets Manager** and click **Next**.
42
-
43
-
1. Select an AWS authentication method from the **Authentication method** pulldown menu.
44
-
45
-
1. Enter the details for the selected method and click **Next** to validate the connection.
46
-
47
-
<Tabs>
48
-
<Tabheading="IAM Role">
49
-
50
-
Select **IAM Role** if you want to use instance profile or role-based authentication.
0 commit comments