|
| 1 | +--- |
| 2 | +page_title: Correlate findings with AWS Secrets Manager |
| 3 | +description: >- |
| 4 | + Correlate findings from HCP Vault Radar with secrets stored in AWS Secrets Manager. |
| 5 | +--- |
| 6 | + |
| 7 | +# Correlate findings with AWS Secrets Manager |
| 8 | + |
| 9 | +When HCP Vault Radar connects to AWS Secrets Manager, Vault Radar can correlate findings with secrets stored in AWS Secrets Manager. This allows you to identify what secrets you need to rotate. |
| 10 | + |
| 11 | +## Connect AWS Secrets Manager |
| 12 | + |
| 13 | +Before you can correlate findings with AWS Secrets Manager, you need to [deploy the Radar agent](/hcp/docs/vault-radar/agent/deploy). Once you deploy the agent, you can configure and connect AWS Secrets Manager to the agent. |
| 14 | + |
| 15 | +### Prerequisites |
| 16 | + |
| 17 | +You need one of the following authentication methods: |
| 18 | + |
| 19 | +- IAM Role authentication with an EC2 instance or configured IAM role |
| 20 | +- Environment variables authentication with AWS Access Key ID and Secret Access Key |
| 21 | + |
| 22 | +Both authentication methods support an optional assume role ARN for cross-account access or elevated permissions. For more information about assuming roles, refer to the [AWS STS AssumeRole documentation](https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html). |
| 23 | + |
| 24 | +### Required permissions |
| 25 | + |
| 26 | +The IAM user, role, or assumed role must have the following permissions: |
| 27 | + |
| 28 | +| Service | Permission | Documentation | |
| 29 | +|---------|------------|---------------| |
| 30 | +| Secrets Manager | `secretsmanager:ListSecrets` | [ListSecrets API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecrets.html) | |
| 31 | +| Secrets Manager | `secretsmanager:DescribeSecret` | [DescribeSecret API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DescribeSecret.html) | |
| 32 | +| Secrets Manager | `secretsmanager:GetSecretValue` | [GetSecretValue API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html) | |
| 33 | +| Secrets Manager | `secretsmanager:ListSecretVersionIds` | [ListSecretVersionIds API](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecretVersionIds.html) | |
| 34 | +| EC2 | `ec2:DescribeRegions` | [DescribeRegions API](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeRegions.html) | |
| 35 | +| STS | `sts:GetCallerIdentity` | [GetCallerIdentity API](https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html) | |
| 36 | + |
| 37 | +### Agent configuration with AWS Secrets Manager |
| 38 | + |
| 39 | +Set up and manage AWS Secrets Manager from the Vault Radar module in the [HCP Portal](https://portal.cloud.hashicorp.com/). Select **Settings**, then **Secret Managers**, and then click **Connect new secret manager**. |
| 40 | + |
| 41 | +1. Select **AWS Secrets Manager** and click **Next**. |
| 42 | + |
| 43 | +1. Select auth method and fill in details on the form, and select **Next** to validate the connection. |
| 44 | + |
| 45 | +<Tabs> |
| 46 | +<Tab heading="IAM Role"> |
| 47 | + |
| 48 | +Select **IAM Role** if you want to use instance profile or role-based authentication. |
| 49 | + |
| 50 | +@include 'vault-radar/indexing/aws-secrets-manager/iam-role.png' |
| 51 | + |
| 52 | +1. (Optional) Enter an assume role ARN in the **Assume Role ARN** text field if you need to assume a different role for access. |
| 53 | + |
| 54 | +</Tab> |
| 55 | +<Tab heading="Environment Variables"> |
| 56 | + |
| 57 | +Select **Environment Variables** if you want to use access keys. |
| 58 | + |
| 59 | +@include 'vault-radar/indexing/aws-secrets-manager/environment-variables.png' |
| 60 | + |
| 61 | +1. Enter your AWS Access Key ID location in the **Access Key ID** text field (default: `env://AWS_ACCESS_ID_LOCATION`). |
| 62 | + |
| 63 | +1. Enter your AWS Secret Access Key location in the **Secret Access Key** text field (default: `env://AWS_SECRET_KEY_LOCATION`). |
| 64 | + |
| 65 | +1. (Optional) Enter an assume role ARN in the **Assume Role ARN** text field if you need to assume a different role for access. |
| 66 | + |
| 67 | +</Tab> |
| 68 | +</Tabs> |
| 69 | + |
| 70 | +1. Vault Radar fetches all active regions for the account and automatically starts index scanning for each region. |
0 commit comments