Skip to content

Commit fd12689

Browse files
RADAR-6812: adding changes to onboard aws secrets manager docs
1 parent 3c0d677 commit fd12689

File tree

3 files changed

+70
-0
lines changed

3 files changed

+70
-0
lines changed
Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
page_title: Correlate findings with AWS Secrets Manager
3+
description: >-
4+
Correlate findings from HCP Vault Radar with secrets stored in AWS Secrets Manager.
5+
---
6+
7+
# Correlate findings with AWS Secrets Manager
8+
9+
When HCP Vault Radar connects to AWS Secrets Manager, Vault Radar can correlate findings with secrets stored in AWS Secrets Manager. This allows you to identify what secrets you need to rotate.
10+
11+
## Connect AWS Secrets Manager
12+
13+
Before you can correlate findings with AWS Secrets Manager, you need to [deploy the Radar agent](/hcp/docs/vault-radar/agent/deploy). Once you deploy the agent, you can configure and connect AWS Secrets Manager to the agent.
14+
15+
### Prerequisites
16+
17+
You need one of the following authentication methods:
18+
19+
- IAM Role authentication with an EC2 instance or configured IAM role
20+
- Environment variables authentication with AWS Access Key ID and Secret Access Key
21+
22+
Both authentication methods support an optional assume role ARN for cross-account access or elevated permissions. For more information about assuming roles, refer to the [AWS STS AssumeRole documentation](https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html).
23+
24+
### Required permissions
25+
26+
The IAM user, role, or assumed role must have the following permissions:
27+
28+
| Service | Permission | Documentation |
29+
|---------|------------|---------------|
30+
| Secrets Manager | `secretsmanager:ListSecrets` | [ListSecrets API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecrets.html) |
31+
| Secrets Manager | `secretsmanager:DescribeSecret` | [DescribeSecret API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DescribeSecret.html) |
32+
| Secrets Manager | `secretsmanager:GetSecretValue` | [GetSecretValue API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html) |
33+
| Secrets Manager | `secretsmanager:ListSecretVersionIds` | [ListSecretVersionIds API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecretVersionIds.html) |
34+
| EC2 | `ec2:DescribeRegions` | [DescribeRegions API](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeRegions.html) |
35+
| STS | `sts:GetCallerIdentity` | [GetCallerIdentity API](https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html) |
36+
37+
### Agent configuration with AWS Secrets Manager
38+
39+
Set up and manage AWS Secrets Manager from the Vault Radar module in the [HCP Portal](https://portal.cloud.hashicorp.com/). Select **Settings**, then **Secret Managers**, and then click **Connect new secret manager**.
40+
41+
1. Select **AWS Secrets Manager** and click **Next**.
42+
43+
1. Select auth method and fill in details on the form, and select **Next** to validate the connection.
44+
45+
<Tabs>
46+
<Tab heading="IAM Role">
47+
48+
Select **IAM Role** if you want to use instance profile or role-based authentication.
49+
50+
@include 'vault-radar/indexing/aws-secrets-manager/iam-role.png'
51+
52+
1. (Optional) Enter an assume role ARN in the **Assume Role ARN** text field if you need to assume a different role for access.
53+
54+
</Tab>
55+
<Tab heading="Environment Variables">
56+
57+
Select **Environment Variables** if you want to use access keys.
58+
59+
@include 'vault-radar/indexing/aws-secrets-manager/environment-variables.png'
60+
61+
1. Enter your AWS Access Key ID location in the **Access Key ID** text field (default: `env://AWS_ACCESS_ID_LOCATION`).
62+
63+
1. Enter your AWS Secret Access Key location in the **Secret Access Key** text field (default: `env://AWS_SECRET_KEY_LOCATION`).
64+
65+
1. (Optional) Enter an assume role ARN in the **Assume Role ARN** text field if you need to assume a different role for access.
66+
67+
</Tab>
68+
</Tabs>
69+
70+
1. Vault Radar fetches all active regions for the account and automatically starts index scanning for each region.
187 KB
Loading
114 KB
Loading

0 commit comments

Comments
 (0)